<?xml version="1.0" encoding="US-ASCII"?>
<!-- This template is for creating an Internet Draft using xml2rfc,
     which is available here: http://xml.resource.org. -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!-- One method to get references from the online citation libraries.
     There has to be one entity for each item to be referenced. 
     An alternate method (rfc include) is described in the references. -->

<!ENTITY RFC1813 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.1813.xml">
<!ENTITY RFC2119 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC2629 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2629.xml">
<!ENTITY RFC3530 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3530.xml">
<!ENTITY RFC3552 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3552.xml">
<!ENTITY RFC5661 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5661.xml">
<!ENTITY I-D.narten-iana-considerations-rfc2434bis SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.narten-iana-considerations-rfc2434bis.xml">
]>
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<!-- used by XSLT processors -->
<!-- For a complete list and description of processing instructions (PIs), 
     please see http://xml.resource.org/authoring/README.html. -->
<!-- Below are generally applicable Processing Instructions (PIs) that most I-Ds might want to use.
     (Here they are set differently than their defaults in xml2rfc v1.32) -->
<?rfc strict="yes" ?>
<!-- give errors regarding ID-nits and DTD validation -->
<!-- control the table of contents (ToC) -->
<?rfc toc="yes"?>
<!-- generate a ToC -->
<?rfc tocdepth="4"?>
<!-- the number of levels of subsections in ToC. default: 3 -->
<!-- control references -->
<?rfc symrefs="yes"?>
<!-- use symbolic references tags, i.e, [RFC2119] instead of [1] -->
<?rfc sortrefs="yes" ?>
<!-- sort the reference entries alphabetically -->
<!-- control vertical white space 
     (using these PIs as follows is recommended by the RFC Editor) -->
<?rfc compact="yes" ?>
<!-- do not start each main section on a new page -->
<?rfc subcompact="no" ?>
<!-- keep one blank line between list items -->
<!-- end of list of popular I-D processing instructions -->



<rfc category="std"
     updates='3530'
     docName="draft-ietf-nfsv4-rfc3530-migration-update-00"

     ipr="trust200902">
  <front>
    <title abbrev="nfsv4-3530-migr-update">
      NFSv4.0 migration: Specification Update
    </title>

    <author initials='D.' surname='Noveck'
            fullname = 'David Noveck' role='editor'>
      <organization abbrev='EMC'>EMC Corporation</organization>
      <address>
        <postal>
          <street>228 South Street</street>
          <city>Hopkinton</city> 
          <region>MA</region>
          <code>01748</code>
          <country>US</country>
        </postal>

        <phone>+1 508 249 5748</phone>
        <email>david.noveck@emc.com</email>
      </address>
    </author> 
    <author initials='P.' surname='Shivam'
            fullname = 'Piyush Shivam'>
      <organization abbrev='ORACLE'>Oracle Corporation</organization>
      <address>
        <postal>
          <street>5300 Riata Park Ct.</street>
          <city>Austin</city>
          <region>TX</region>
          <code>78727</code>
          <country>US</country>
        </postal>

        <phone>+1 512 401 1019</phone>
        <email>piyush.shivam@oracle.com</email>
      </address>
    </author>

    <author initials='C.' surname='Lever'
            fullname = 'Charles Lever'>
      <organization abbrev='ORACLE'>Oracle Corporation</organization>
      <address>
        <postal>
          <street>1015 Granger Avenue</street>
          <city>Ann Arbor</city>
          <region>MI</region>
          <code>48104</code>
          <country>US</country>
        </postal>

        <phone>+1 248 614 5091</phone>
        <email>chuck.lever@oracle.com</email>
      </address>
    </author>

    <author initials='B.' surname='Baker'
            fullname = 'Bill Baker'>
      <organization abbrev='ORACLE'>Oracle Corporation</organization>
      <address>
        <postal>
          <street>5300 Riata Park Ct.</street>
          <city>Austin</city>
          <region>TX</region>
          <code>78727</code>
          <country>US</country>
        </postal>

        <phone>+1 512 401 1081</phone>
        <email>bill.baker@oracle.com</email>
      </address>
    </author>




   <date year="2012"/>

   <area>Transport</area>
   <workgroup>NFSv4</workgroup>

    <abstract>
      <t>
        The migration feature of NFSv4 allows for responsibility for a
        single filesystem to move from one server to another, without 
        disruption to clients.  Recent implementation experience has shown 
        problems in the existing specification for this feature in NFSv4.0.   
        This document clarifies and corrects the NFSv4.0 
        specification (RFC3530 and possible successors) to address these 
        problems.
      </t>
    </abstract>


  </front>

  <middle>
        
  <section title="Introduction">
      <t>
        This document is a standards track document which corrects the 
        existing definitive specification  of the NFSv4.0 protocol, in
        <xref target="RFC3530" /> and the one expected to become definitive 
        (now in <xref target="cur-rfc3530-bis" />).  Given this fact, 
        one should take the current document into account when learning about
        NFSv4.0, particularly if one is concerned with issues that
        relate to:
      <list style='symbols'>
        <t>
          Filesystem migration, particularly when it involves transparent
          state migration.
        </t>
        <t>
          The construction and interpretation of the nfs_clientid4
          structure and particularly the requirements on the id string
          within it, referred to below as a "client id string".
        </t>
      </list>
      </t>
  </section>
        
  <section title="Conventions">
      <t>
        The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", 
        "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be 
        interpreted as described in <xref target="RFC2119" />.
      </t>
    </section>
  <section title="Background">
    <t>
      Implementation experience with transparent state migration has
      exposed a number of problems with the existing specification 
      of this feature, in <xref target="RFC3530" /> and in RFC3530bis
      (see the draft at <xref target="cur-rfc3530-bis" />).  The symptoms
      were:
    <list style='symbols'>
      <t>
        After migration of a file system, a reboot of the associated client
        was not appropriately dealt with, in that the state associated 
        with the rebooting client was not promptly freed.
      </t>
      <t>
        Situations can arise whereby a given server has multiple leases
        with the same nfs_client_id4 (id and verifier), when the
        protocol clearly assumes there can be only one.
      </t>
      <t>
        Excessive client implementation complexity since clients have to 
        deal with situations in which a single client can wind up with its 
        locking state with a given server divided among multiple leases 
        each with its own clientid4.
      </t>
    </list>
    </t>
    <t>
      An analysis of these symptoms leads to the conclusion that existing 
      specifications have erred.  They assume that locking state, 
      including both state ids and clientid4's, should be transferred 
      as part of transparent state migration.  The
      troubling symptoms arise from the failure to describe how migrating
      state is to be integrated with existing client definition structures
      on the destination server. 
    </t>
    <t>
      Specification of requirements for the server to appropriately merge
      stateids associated with a common client boot instance
      encounters a difficult problem.  The issue is that the common client 
      practice with regard to the presentation of unique strings specifying
      client identity makes it essentially impossible for the client to 
      determine
      whether or not two stateids, originally generated on different servers
      are referable to the same client.  This practice is allowed and 
      endorsed, although not "RECOMMENDED", by existing NFSv4.0 specifications
      (<xref target="RFC3530" /> and RFC3530bis, whose current draft is
      at <xref target="cur-rfc3530-bis" />).
    </t>
    <t>
      To further complicate matters, upon prototyping of clients 
      implementing an alternative approach, it has been found that there 
      exist servers which do not work well with these new clients.  
      It appears that current circumstances, in which a particular client 
      implementation pattern had been adopted universally, has resulted 
      in servers not being able to interoperate against alternate client 
      implementation patterns.  As a result, we have a situation which  
      requires careful attention to compatibility issues to untangle.
    </t>
    <t>
      This document updates the existing NFSv4.0 specifications
      (<xref target="RFC3530" /> and RFC3530bis, whose current draft is 
      at <xref target="cur-rfc3530-bis" />) as follows:
    </t>
    <t>
    <list style='symbols'>
      <t>
        It makes clear that NFSv4.0 supports multiple approaches to the
        construction of client id strings, including that formerly endorsed
        by existing NFSV4.0 specifications, and currently widely deployed. 
      </t>
      <t>
        It addresses the potential compatibility issues that might arise
        for clients adopting a previously non-favored client id construction
        approach including the existence of servers which have problems
        with the new approach.
      </t>
      <t>
        It gives some guidance regarding the factors that might govern 
        clients' choice of a client id construction approach and RECOMMENDS 
        that clients construct client id strings in manner that supports
        lease merger if they intend to support transparent state migration. 
      </t>
      <t>
        It specifies how state is to be transparently migrated, including 
        defining how state that arrives at a new server as part of migration
        is to be merged into existing leases for clients connected to the
        target server.
      </t>
      <t>
        It makes further clarifications and corrections to address cases 
        where  the specification text does not take proper account of the 
        issues raised by state migration or where it has been found that 
        the existing text is insufficiently clear.  
      </t>
    </list>
    </t>
    <t>
      For a more complete  explanation of the choices made in addressing these 
      issues, see <xref target="info-migr" />).
    </t>
  </section>
  <section title="Client Identity Definition">
    <t>
      This chapter is a replacement for sections 8.1.1 and 8.1.2
      in <xref target="RFC3530" /> and for sections 9.1.1 and 9.1.2
      in RFC3530bis (see the draft at <xref target="cur-rfc3530-bis" />).
      The replaced sections are named "client ID" and "Server Release 
      of Clientid."
    </t>
    <t>
      It supersedes the replaced sections.
    </t>
    <section anchor="cid-diffs" 
             title="Differences from Replaced Sections">
      <t>
        Because of the need for greater attention to and careful
        description of this area, this chapter is much larger than the
        sections it replaces.  The principal changes/additions made
        by this chapter are:
      <list style = 'symbols'>
        <t>
          It corrects inconsistencies regarding the possible role or 
          non-role of client IP address in construction of client id strings.
        </t>
        <t>
          It clearly addresses the need to save client id strings or any 
          changeable values that are used in their construction.
        </t>
        <t>
          It provides a more complete description of circumstances leading
          to clientid4 invalidity and the appropriate recovery actions.  
        </t>
        <t>
          It presents, as valid alternatives, two approaches to client id 
          string construction (named "uniform" and "non-uniform") 
          and gives some implementation guidance to
          help implementers choose one or the other of these.
        </t>
        <t>
          It adds a discussion of issues involved for clients in interacting 
          with servers whose behavior is not consistent with use of
          uniform client id strings 
        </t>
        <t>
          It adds a description of how server behavior might be
          used by the client to determine server address trunking
          patterns.
        </t>
      </list>
      </t>
    </section>

    <section title="Client Identity data items"
             anchor="cid-data-items"> 
      <t>
        The NFSv4 protocol contains a number of protocol entities to identify
        clients and client-based entities, for locking-related purposes:
      <list style='symbols'>
        <t>
          The nfs_client_id4 structure which uniquely identifies a specific
          client boot instance.  That identification is presented to the
          server by doing a SETCLIENTID operation.  
        </t>
        <t>
          The clientid4 which is returned by the server upon completion of
          a successful SETCLIENTID operation.  This id is used by the client 
          to identify itself when doing subsequent locking-related operations.
          A clientid4 is associated with a particular lease whereby a client 
          instance holds state on a server instance and may become invalid 
          due to client reboot, server reboot, or other circumstances.
        </t>
        <t>
          Opaque arrays which are used together with the clientid4 to designate
          within-client entities (e.g. processes) as the owners of opens 
          (open-owners) and owners of byte-range locks (lock-owners).
        </t>
      </list>
      </t>
      <t>
        The basis of the client identification infrastructure is encapsulated 
        in the following data structure:
      </t>
      <figure>
        <artwork>
struct nfs_client_id4 {
        verifier4       verifier;
        opaque          id&lt;NFS4_OPAQUE_LIMIT&gt;;
};
        </artwork>
      </figure>
      <t>
        The nfs_client_id4 structure uniquely defines a client boot
        instance as follows: 
      <list style='symbols'>
        <t>
          The id field is a variable-length string which uniquely identifies
          a specific client.  Although, we describe it as a string and it is
          often referred to a "client string," it should be understood that  
          the protocol defines this as opaque data.  In particular, those 
          receiving such an id should not assume that it will be in the UTF-8 
          encoding.  Servers MUST NOT reject an nfs_client_id4 simply because 
          the id string does not follow the rules of UTF-8 encoding.
        <vspace blankLines='1' />
          The string MAY be different for each server 
          network address that the client accesses, rather than 
          common to all server network addresses.  
        </t>
        <t>
          The verifier is a client incarnation identifier that is
          used by the server to detect client reboots.  Only if the 
          verifier is different from that which the server has previously 
          recorded in connection with the client (as identified by the id
          field) does the server cancel the client's leased state, once it
          receives confirmation of the new nfs_clientd4 via 
          SETCLIENTID_CONFIRM.
        <vspace blankLines='1' />
          As a security measure, the server MUST NOT cancel a client's
          leased state if the principal that established the state for a given
          id string is not the same as the principal issuing the SETCLIENTID.
        </t>
      </list>
      </t>
      <t>
        There are several considerations for how the client generates
        the id string:

        <list style='symbols'>
          <t>
            The string should be unique so that multiple clients do not
            present the same string.  The consequences of two clients
            presenting the same string range from one client getting
            an error to one client having its leased state abruptly and
            unexpectedly canceled.
          </t>

          <t>
            The string should be selected so that subsequent incarnations
            (e.g., reboots) of the same client cause the client to present
            the same string.  The implementer is cautioned against an
            approach that requires the string to be recorded in a local
            file because this precludes the use of the implementation
            in an environment where there is no local disk and all file
            access is from an NFSv4 server.
          </t>

          <t>
            The string MAY be different for each server network address
            that the client accesses, rather than common to all server
            network addresses.  
          <vspace blankLines='1' />
            The considerations that might influence a client to use 
            different strings for different network server addresses
            are explained in <xref target='clstr-approaches' />.
          </t>

          <t>
            The algorithm for generating the string should not assume that
            the client's network address is forever fixed.  Changes might
            occur between client incarnations and even while
            the client is still running in its current incarnation.
          <vspace blankLines='1' />
            Having the client id string change simply because of a network 
            address change would mean that successive SETCLIENTID operations 
            for the same client would appear as from different clients, 
            interfering with the use of the nfs_client_id4 verifier 
            to cancel state
            associated with previous boot instances of the same client.
          <vspace blankLines='1' />
            The difficulty is more severe if the client address is the only
            client-based information in the client id string.  In such a 
            case, there is a real risk that,
            after the client gives up the network address, another
            client, using a similar algorithm for generating the id string,
            will generate a conflicting id string.
          </t>
        </list>
      </t>
      <t>
        Once a SETCLIENTID and SETCLIENTID_CONFIRM sequence has 
        successfully completed, the client uses the shorthand client 
        identifier, of type clientid4, instead of the longer and 
        less compact nfs_client_id4 structure.  This shorthand client 
        identifier (a client ID) is assigned by the server and should 
        be chosen so that it will not conflict with a client ID 
        previously assigned by same server.  This applies across 
        server restarts or reboots.  
      </t>
      <t>
        Note that the SETCLIENTID and SETCLIENTID_CONFIRM operations have
        a secondary
        purpose of establishing the information the server needs to make
        callbacks to the client for the purpose of supporting delegations.
        The client is able to change this information via SETCLIENTID and
        SETCLIENTID_CONFIRM within the same incarnation of the client
        without causing removal of the client's leased state.
      </t>
      <t>
        Distinct servers MAY assign clientid4's independently, and
        will generally do so.  Therefore, a client has to be prepared
        to deal with multiple instances of the same clientid4 value
        received on distinct IP addresses, denoting separate entities.
        When trunking of server IP addresses is not a consideration,
        a client should keep track of (IP-address, clientid4) pairs,
        so that each pair is distinct.  For a discussion of how to
        address the issue in the face of possible trunking of server 
        IP addresses, see <xref target='clstr-approaches' />.             
      </t>
      <t>
        Owners of opens and owners of byte-range locks are separate
        entities and remain separate even if the same opaque arrays
        are used to designate owners of each.  The protocol distinguishes
        between open-owners (represented by open_owner4 structures)
        and lock-owners (represented by lock_owner4 structures).
      </t>
      <t>
        Both sorts of owners consist of a clientid4 and an opaque
        owner string.  For each client, the set of distinct owner values
        used with that client constitutes the set of owners of that type,
        for the given client.
      </t>

      <t>
        Each open is associated with a specific open-owner while each
        byte-range lock is associated with a lock-owner and an
        open-owner, the latter being the open-owner associated with the
        open file under which the LOCK operation was done.
      </t>

      <t>
        When a clientid4 is presented to a server and that clientid4
        is not recognized, the server will reject the request with
        the error NFS4ERR_STALE_CLIENTID.   This can occur for a number
        of reasons:
      <list style='symbols'>
        <t>
          A server reboot causing loss of the server's knowledge of
          the client
        </t>
        <t>
          Client error sending an incorrect clientid4 or a valid 
          clientid4 to the wrong server.
        </t>
        <t>
          Loss of lease state due to lease expiration.
        </t>
        <t>
          Client or server error causing the server to believe that
          the client has rebooted (i.e. receiving a SETCLIENTID with an
          nfs_client_id4 which has a matching id string and a 
          non-matching boot verifier).
        </t>
        <t>
          Migration of all state under the associated lease causes its
          non-existence to be recognized on the source server.
        </t>
        <t>
          Merger of state under the associated lease with another
          lease under a different clientid causes the clientid4 serving
          as the source of the merge to cease being recognized on its 
          server.   
        </t>
        </list>
        </t>
        <t>
          In the event of a server reboot, or loss of lease state due
          to lease expiration, the client must obtain a new clientid4 
          by use of the SETCLIENTID operation and then
          proceed to any other necessary recovery for the server reboot 
          case (See the section entitled "Server Failure and Recovery").
          In cases of server or client error resulting in this error,
          use of SETCLIENTID to establish a new lease is desirable as 
          well. 
        </t>
        <t>
          In the last two cases, different recovery procedures are 
          required.  See <xref target='mars-lock-migr' /> for details.
          Note that in cases in which there is any uncertainty about
          which sort of handling is applicable, the distinguishing 
          characteristic is that in reboot-like cases, the clientid4 and
          all associated stateids cease to exist while in 
          migration-related cases, the clientid4 ceases to exist 
          while the stateids are still valid. 
        </t>
        <t>
          The client must also employ the SETCLIENTID operation when it
          receives a NFS4ERR_STALE_STATEID error using a stateid derived 
          from its current clientid4, since this indicates a situation,
          such as server reboot which has invalidated the existing 
          clientid4 and associated stateids (see the section
          entitled "lock-owner" for details).
        </t>
        <t>
          See the detailed descriptions of SETCLIENTID and 
          SETCLIENTID_CONFIRM for a complete specification of the 
          operations.
        </t>


    </section>
    <section anchor="cid-release"
              title="Server Release of Client ID">

      <t>
        If the server determines that the client holds no associated state
        for its clientid4, the server may choose to release that clientid4.
        The server may make this choice for an inactive client so that
        resources are not consumed by those intermittently active clients.
        If the client contacts the server after this release, the server
        must ensure the client receives the appropriate error so that it
        will use the SETCLIENTID/SETCLIENTID_CONFIRM sequence to establish
        a new identity.  It should be clear that the server must be very
        hesitant to release a client ID since the resulting work on the
        client to recover from such an event will be the same burden
        as if the server had failed and restarted.  Typically a server
        would not release a client ID unless there had been no activity
        from that client for many minutes.
      </t>

      <t>
        Note that if the id string in a SETCLIENTID request is properly
        constructed, and if the client takes care to use the same principal
        for each successive use of SETCLIENTID, then, barring an active
        denial of service attack, NFS4ERR_CLID_INUSE should never be
        returned.
      </t>

      <t>
        However, client bugs, server bugs, or perhaps a deliberate change
        of the principal owner of the id string (such as may occur in
        the case in which a client changes security flavors, and under the 
        new flavor, there is no mapping to the previous owner) will in 
        rare cases
        result in NFS4ERR_CLID_INUSE.
      </t>

      <t>
        In that event, when the server gets a SETCLIENTID specifying a client id 
        string for which the server has a clientid4 that currently has no state, 
        or for which it has state, but where the lease has expired, the server 
        MUST allow the SETCLIENTID, rather than returning 
        NFS4ERR_CLID_INUSE.  The server MUST then confirm the new 
        client ID if followed by the appropriate SETCLIENTID_CONFIRM.
      </t>
    </section>
    <section title="client id string Approaches"
             anchor="clstr-approaches"> 
               
        <t>
          One particular aspect of the construction of the nfs_client_id4
          string has proved recurrently troublesome.  The client has a
          choice of:
        <list style='symbols'>
          <t>
            Presenting the same id string to multiple server addresses.
            This is referred to as the "uniform client id string approach" 
 	    and is discussed in <xref target="clstr-uni" />.  
          </t>
          <t>
            Presenting different id strings to multiple server addresses.
            This is referred to as the "non-uniform client id string approach" 
            and is discussed in <xref target="clstr-non-uni" />.  
          </t>
        </list>
        </t>
        <t>
          Note that implementation considerations, including compatibility 
          with existing servers, may make it desirable for a client to 
          use both approaches, based on configuration information, such as
          mount options.  This issue will be discussed in 
          <xref target="clstr-mixing" />. 
        </t> 
        <t>
          Construction of the client id string has arisen as a difficult
          issue because of the way in which the NFS protocols have evolved.
        <list style='symbols'>
          <t>
            NFSv3 as a stateless protocol had no need to identify the
            state shared by a particular client-server pair.  
            (See <xref target="RFC1813" />). Thus
            there was no occasion to consider the question of whether a
            set of requests come from the same client, or whether two 
            server IP addresses are connected to the same server.
            As the environment was one in which the user supplied
            the target server IP address as part of incorporating the
            remote filesystem in the client's file name space, there
            was no occasion to take note of server trunking.  Within
            a stateless protocol, the situation was symmetrical.  The client
            has no server identity information and the server has no 
            client identity information. 
          </t>
          <t>
            NFSv4.1 is a stateful protocol with full support for client
            and server identity determination (See <xref target="RFC5661" />).
            This enables the server to
            be aware when two requests come from the same client (they are
            on sessions sharing a clientid4) and the client to be aware when 
            two server IP addresses are connected to the same server 
            (they return the same server name in responding to an EXCHANGE_ID).
          </t>
        </list>
        </t>
        <t>
          NFSv4.0 is unfortunately halfway between these two.  The two
          client id string approaches have arisen in attempts to deal with 
          the changing requirements of the protocol as implementation 
          has proceeded and features that were not very substantial in
          early implementations of <xref target="RFC3530" />, became more 
          substantial as implementation proceeded. 
        <list style='symbols'>
          <t>
            In the absence of any implementation of the fs_locations-related
            features (replication, referral, and migration), the situation
            is very similar to that of NFSv3, with the addition of state but 
            with no concern to provide accurate client and server identity 
            determination.  This is the situation that gave rise to the 
            non-uniform client id string approach.
          </t>
          <t>
            In the presence of replication and referrals, the client may have
            occasion to take advantage of knowledge of server trunking
            information.  Even more important, transparent state migration, 
            by transferring
            state among servers, causes difficulties for the non-uniform 
            client id string approach, in that the two different client id strings 
            sent to different IP addresses may wind up on the same IP address, 
            adding confusion.
          </t>
          <t>
            A further  consideration is that client implementations 
            typically provide NFSv4.1 by augmenting their existing NFSv4.0 
            implementation, not by providing two separate implementations.  
            Thus the more NFSv4.0 and NFSv4.1 can work alike, the less 
            complex are clients.  This is a key reason why those 
            implementing NFSv4.0 clients might prefer using the uniform 
            client string model, even if they have chosen not to provide 
            fs_locations-related features in their NFSv4.0 client.
          </t>
        </list>
        </t>
        <t>
          Both approaches have to deal with the asymmetry in client and server
          identity information between client and server.  Each seeks to 
          make the client's and the server's views match.  In the process,
          each encounters some combination of inelegant protocol features
          and/or implementation difficulties.  The choice of which to use
          is up to the client implementer and the sections below try to give
          some useful guidance.
        </t>
      </section>
      <section title="Non-Uniform client id string Approach"
               anchor="clstr-non-uni"> 
                 
          <t>
             The non-uniform client id string approach is an attempt to handle
             these matters in NFSv4.0 client implementations in as 
             NFSv3-like a way as possible. 
          </t>
          <t>
             For a client using the non-uniform approach, all internal 
             recording of clientid4 values is to include, whether 
             explicitly or implicitly,
             the server IP address so that one always has an (IP-address,
             clientid4) pair.  Two such pairs from different servers are always
             distinct even when the clientid4 values are the same, as they
             may occasionally be.  In this approach, such equality is always 
             treated as simple happenstance.
          </t>
          <t>
             Making the client id string different on different
             server IP addresses results in a situation in which a 
             server has no way of tying together information from the 
             same client, when the client accesses multiple server
             IP addresses.  As a result, it will
             treat a single client as multiple clients with separate
             leases for each server network address.  Since there is
             no way in the protocol for the client to determine if
             two network addresses are connected to the same server, the
             resulting lack of knowledge is symmetrical and can result
             in simpler client implementations in which there is a 
             single clientid/lease per server network addresses.  
          </t>
          <t>
             Support for migration, particularly with transparent state
             migration, is more complex in the case of non-uniform
             client id strings.  For example, migration of a lease can result
             in multiple leases for the same client accessing the same
             server addresses, vitiating many of the advantages of
             this approach. 
             Therefore, client implementations that support migration 
             with transparent state migration SHOULD NOT use the non-uniform
             client id string approach, except where it is necessary for
             compatibility with existing server implementations (For details 
             of arranging use of multiple client id string approaches, see
	     <xref target="clstr-mixing" />).
          </t>
      </section>
      <section title="Uniform client id string Approach"
               anchor="clstr-uni"> 
                 
          <t>
             When the client id string is kept uniform, the server has the
             basis to have a single clientid4/lease for each distinct
             client.  The problem that has to be addressed is the lack
             of explicit server identity information, which was made
             available in NFSv4.1.   
          </t>
          <t>
             When the same client id string is given to multiple IP
             addresses, the client can determine whether two IP addresses
             correspond to a single server, based on the server's behavior.
             This is the inverse of the
             strategy adopted for the non-uniform approach in which different 
             server IP addresses are told about different clients, simply 
             to prevent a server from manifesting behavior that is 
             inconsistent with there being a single server for each 
             IP address, in line with the traditions of NFS.   So, to compare:
          <list style='symbols'>
             <t>
               In the non-uniform approach, servers are told about different
               clients because, if the server were to use accurate information
               as to client identity, 
               two IP addresses on the same server would behave as if 
               they were talking to the same client, which might prove 
               disconcerting to 
               a client not expecting such behavior.
             </t>
             <t>
               In the uniform approach, the servers are told about 
               there being a single client, which is, after all, the truth.
               Then, when the server uses this information, two IP addresses
               on the same server will behave as if they are talking to the same
               client, and this difference in behavior allows the client to 
               infer the server IP address trunking configuration, even though 
               NFSv4.0 does not explicitly provide this information.
             <vspace blankLines='1' />
               The approach given in the section below shows one example 
               of how this might be done.  
             </t>
          </list>
          </t>
          <t>
            The uniform client id string approach makes it necessary to exercise
            more care in the definition of the nfs_client_id4 boot
            verifier:
          <list style='symbols'>
            <t>
              In <xref target="RFC3530" />, the client is told to change
              the boot verifier when reboot occurs, but there is no explicit
              statement as to the converse, so that any requirement to keep
              the verifier constant unless rebooting is only present by
              implication.  
            </t>
            <t>
              Many existing clients change the boot verifier every time they 
              destroy and recreate the data structure that tracks an  
              &lt;IP-address, clientid4&gt; pair.  This might happen if the 
              last mount of a particular server is removed, and then a 
              fresh mount is created.  And, note that this might result
              in each &lt;IP-address, clientid4&gt; pair having its own boot 
              verifier that is independent of the others.
            </t>
            <t>
              Within the uniform client id string approach, an nfs_client_id4
              designates a globally known client instance, so that the boot
              verifier should change if and only if a new client instance
              is created, typically as a result of a reboot.
            </t>
          </list>
          </t>
          <t>
             The following are advantages for the implementation of using
             the uniform client id string approach:
          <list style='symbols'>
            <t>
              Clients can take advantage of server trunking (and clustering
              with single-server-equivalent semantics) to increase bandwidth 
              or reliability.
            </t>
            <t>
             There are advantages in state management so that,
             for example, we never have a delegation under one clientid
             revoked because of a reference to the same file from the 
             same client
             under a different clientid.  
            </t>
            <t>
             The uniform client id string approach allows the server 
             to do any necessary
             automatic lease merger in connection with transparent
             state migration, without 
             requiring any client involvement.
             This consideration is of sufficient weight  
             to cause us to RECOMMEND use of the
             uniform client id string approach for clients supporting transparent
             state migration.
            </t>
          </list>
          </t>
          <t>
             The following implementation considerations might cause
             issues for client implementations.
          <list style='symbols'>
            <t>
              This approach is considerably different from the non-uniform
              approach, which most client implementations have been following.
              Until substantial implementation experience is obtained with
              this approach, reluctance to embrace something so new is to
              be expected.
            </t>
            <t>
              Mapping between server
              network addresses and leases is more complicated in 
              that it is no longer a one-to-one mapping.              
            </t>
          </list>
          </t>
          <t>
            How to balance these considerations depends on implementation
            goals.
          </t>
     </section>
     <section title="Mixing client id string Approaches"
              anchor="clstr-mixing"> 
          <t>
            As noted above, a client which needs to use the uniform 
            client id string approach (e.g. to support migration), may also
            need to support existing servers with  
            implementations that do not work properly in this case.
          </t>
          <t>
            Some examples of such server issues include:
          <list style='symbols'>
            <t>
              Some existing NFSv4.0 server implementations of IP address
              failover depend on clients' use of a non-uniform 
              client id string approach.  In particular, when a server
              supports both its own IP address and one failed over from a
              partner server, it may have separate sets of state applicable
              to the two IP addresses, owned by different servers but
              residing on a single one.
            <vspace blankLines='1' />
              In this situation, some servers have relied on clients' use 
              of the non-uniform client id string approach, as suggested but
              not mandated by <xref target="RFC3530" />, to keep these sets of
              state separate, and will have problems in handling clients
              using the uniform client id string approach, in that such
              clients will see changes in trunking relationships whenever
              server failover and giveback occur.   
            </t>
            <t>
              Some existing servers incorrectly return NFS4ERR_CLID_INUSE
              simply because there already exists a clientid for the same 
              client, established using a different IP address.  This causes 
              difficulty for a multi-homed client using the uniform  
              client id string approach.
            <vspace blankLines='1' />
              Although this behavior is not correct, such
              servers still exist and the spec should give clients guidance
              about dealing with the situation, as well as
              making the correct behavior clear.   
            </t>
          </list>
          </t>
          <t>
            In order to support use of these sorts of servers, the client 
            can use different client id string approaches for different
            mounts, as long as:
          <list style='symbols'>
            <t>
              The uniform client id string approach is used when accessing
              servers that may return NFS4ERR_MOVED and the client wishes to 
              enable transparent state migration."
            </t>
            <t>
              The non-uniform client id string approach is used when accessing
              servers whose implementations make them incompatible
              with the uniform client id string approach
            </t>
          </list>
          </t>
          <t>
            One effective way for clients to handle this is to support
            the uniform client id string approach as the default, but allow a
            mount option to specify use of the non-uniform client id string
            approach for particular mount points, as long as such mount
            points are not used when migration is to be supported.            
          </t>
          <t>
            In the case in which the same server has multiple mounts, and
            both approaches are specified for the same server, the client could
            have multiple clientids corresponding to the same server, one 
            for each approach and would then have to keep these separate. 
          </t>
     </section>
     <section title="Trunking Determination when using Uniform client id strings"
              anchor="clstr-uni-trunk"> 
                 
          <t>
             This section provides an example of how trunking determination 
             could be done by a client following the uniform client id string 
             approach (whether this is used for all mounts or not).  
             Clients need not follow this procedure but 
             implementers should make sure that the issues dealt with by 
             this procedure are all properly addressed.
          </t>
          <t>
             We need to clarify the various possible purposes of trunking
             determination and the corresponding requirements as to server 
             behavior.  The following points should be noted:
          <list style='symbols'>
            <t>
              The primary purpose of the trunking determination algorithm 
              is to make sure that, if the server treats client requests 
              on two IP addresses as part of the same client, the client 
              will not be blind-sided and encounter
              disconcerting server behavior, as mentioned in 
              <xref target="clstr-uni" />.  Such behavior could 
              occur if the client were 
              unaware that all of its client requests for the two IP
              addresses were being handled as part of a single client 
              talking to a single server.
            </t>
            <t>
              A second purpose is to be able to use knowledge of trunking 
              relationships for better performance, etc.
            </t>
            <t>
              If a server were to give out distinct clientid's in response
              to receiving the same nfs_client_id4 on different network
              addresses,  and acted as if these were separate clients, the 
              primary purpose of trunking determination would be met, 
              as long as 
              the server did not treat them as part of the same client.  
              In this case, the server would be acting, with regard to that
              client, as if it were two 
              distinct servers.  This would interfere with the secondary 
              purpose of trunking determination but there is nothing 
              the client can do about that.
            </t>
            <t>
              Suppose a server were to give such a client two different 
              clientid's but act as if they were one.  That is the 
              only way that the server could behave in a way that would 
              defeat the primary purpose of the trunking determination 
              algorithm.
            <vspace blankLines='1' />
              Servers MUST NOT do that.
            </t>
          </list>
          </t>
          <t>
             For a client using the uniform approach, clientid4 values are 
             treated as important information in determining server 
             trunking patterns.
             For two different IP addresses to return the same clientid4 
             value is a necessary, though not a sufficient condition for
             them to be considered as connected to the same server.
             As a result, when two different IP addresses return the same 
             clientid4, the client needs to determine, using the procedure
             given below or otherwise, whether the IP addresses are connected
             to the same server.  For such clients, all internal recording
             of clientid4 values needs to include, whether explicitly 
             or implicitly, identification of the server from which the 
             clientid4 was received so that one always has a 
             (server, clientid4) pair.  Two such pairs from different 
             servers are 
             always considered distinct even when the clientid4 values 
             are the same, 
             as they may occasionally be.  
          </t>
          <t>
             In order to make this approach work, the client must have 
             accessible, for each nfs_client_id4 used by the uniform
             approach (only one in general) a list of all server IP 
             addresses, together
             with the associated clientid4 values, SETCLIENTID principals 
             and authentication 
             flavors.  As a part of the associated
             data structures, there should be the ability to mark a server
             IP structure as having the same server as another and to mark
             an IP address as currently unresolved.  One way to do this
             is to a allow each such entry to point to another with the
             pointer value being one of:
          <list style='symbols'>
            <t>
              A pointer to another entry for an IP address associated with
              the same server, where that IP address is the first one 
              referenced to access that server. 
            </t>
            <t>
              A pointer to the current entry if there is no earlier IP
              address associated with the same server, i.e. where 
              the current IP 
              address is the first one referenced to access that server.
              We'll refer to such an IP address as the lead IP address for
              a given server.  
            </t>
            <t>
              The value NULL if the address's server identity is currently
              unresolved.
            </t>
          </list>
          </t>
          <t>
             In order to keep the above information current, in the
             interests of the most effective trunking determination,
             RENEWs should be periodically done on each server.
             However, even if this is not done, the primary purpose
             of the trunking determination algorithm, to prevent
             confusion due to trunking hidden from the client, will
             be achieved. 
          </t>
          <t>
             Given this apparatus, when a SETCLIENTID is done and a 
             clientid4 returned, the data structure can be searched for
             a matching clientid4 and if such is found, further
             processing can be done to determine whether the clientid4
             match is accidental, or the result of trunking.
          </t>
          <t>
             In this algorithm, when SETCLIENTID is done it will use the 
             common nfs_client_id4 and specify the current target IP address
             as part of the callback parameters.  We call the 
             clientid4 and SETCLIENTID verifier returned by this operation 
             XC and XV.   
          </t>
          <t>
             Note that when the client has done previous SETCLIENTID's,
             to any IP addresses, with more than one principal or 
             authentication flavor, we have the possibility of receiving 
             NFS4ERR_CLID_INUSE, since we do not yet know which of
             our connections with existing IP addresses might be trunked
             with our current one.  In the event that the SETCLIENTID 
             fails with NFS4ERR_CLID_INUSE, one must try all other combinations
             of principals and authentication flavors currently in use and 
             eventually one will
             be correct and not return NFS4ERR_CLID_INUSE.
          </t>
          <t>
             Note that at this point, no SETCLIENTID_CONFIRM has yet been 
             done.  This is because our SETCLIENTID has either established 
             a new clientid4 on a previously unknown server or changed the 
             callback parameters on a clientid4 associated with some 
             already known server.  Given that we don't want to confirm 
             something that we are not sure we want to happen, what is to 
             be done next depends on information about existing 
             clientid4's.
          <list style='symbols'>
            <t>
              If no matching clientid4 is found, the IP address X and clientid4
              XC are added to the list and considered as having no existing 
              known IP addresses trunked with it.  The IP address is marked as
              a lead IP address for a new server.  A SETCLIENTID_CONFIRM
              is done using XC and XV.
            </t>
            <t>
              If a matching clientid4 is found which is marked unresolved,
              processing on the new IP address is suspended.  In order to
              simplify processing, there 
              can only be one unresolved IP address 
              for any given clientid4.
            </t>
            <t>
              If one or more matching clientid4's is found, none of which is 
              marked unresolved, the new IP address in entered and marked 
              unresolved.  After applying the steps below to each of the
              lead IP addresses with a matching clientid4, the address will 
              have been resolved:  It may been determined to be part of an 
              already known server as a new IP address to be added to an 
              existing set of IP addresses for that server.  Otherwise, it will
              be recognized as a new server.  At the point at which this 
              determination is made, the unresolved
              indication is cleared and any suspended SETCLIENTID 
              processing is restarted 
            </t>
          </list>
          </t>
          <t>
             So for each lead IP address IPn with a clientid4 matching XC, the 
             following steps are done.
          <list style='symbols'>
            <t>
              If the principal for IPn does not 
              match that for X, the IP address is skipped, since it is 
              impossible or IPn and X to be trunked in these circumstances.  
              If the principal does match but the authentication flavor
              does not, the authentication flavor already used should be used
              for address X as well.  This will
              avoid any possibility that NFS4ERR_CLID_INUSE will be 
              returned for the SETCLIENTID and SETCLIENTID_CONFIRM to be 
              done below, as long
              as the server(s) at IP addresses IPn and X are correctly 
              implemented.
            </t>
            <t>
              A SETCLIENTID is done to update the callback parameters to
              reflect the possibility that X will be marked as associated
              with the server whose lead IP address is IPn.  The specific
              callback parameters chosen, in terms of cb_client4 and
              callback_ident, are up to the client and should reflect
              its preferences as to callback handling for the common 
              clientid, in 
              the event that X and IPn are trunked together.   
              So assume
              that we do that SETCLIENTID on IP address IPn and get back 
              a setclientid_confirm value (in the form of a verifier4) 
              SCn.
            <vspace blankLines='1' />  
              Note that the NFSv4.0 specification
              requires the server to make sure that such verifiers are
              very unlikely to be regenerated.  Given that it is already
              highly unlikely that the clientid XC is duplicated by distinct
              servers, the probability that Sc is duplicated as well has 
              to be considered vanishingly small.  Note also that the 
              callback update procedure can be repeated multiple times 
              to reduce the probability of spurious matches further.
            </t>
            <t>
              Note that we don't want this to happen if address X is not
              associated with this server.  So we do a SETCLIENTID_CONFIRM
              on address X using the setclientid_confirm value SCn.
            </t>
            <t>
              If the setclientid_confirm value generated on X is accepted 
              on IPn, then X and IPn 
              are recognized as connected to the same server 
              and the entry for X is marked as associated with IPn.
              The entry is now resolved and processing can be restarted for
              IP addresses whose clientid4 matched XC but whose
              resolution had been deferred.
            </t>
            <t>
              If the confirm value generated on IPn is not accepted on X, 
              then X and IPn are distinct and the callback update will not 
              be confirmed.  So we go on to the next IPn, until we run out
              of them.  If it happens that we run out of potential matches,
              then we can treat X as connected to a distinct server and 
              then update and confirm its callback
              parameters on that basis.
            </t>
          </list>
          </t>
          <t>
            Note here that we may set a number of possible values for the
            callback parameters to be used for XC, one for the possibility
            that X is untrunked, and others for each potential match
            with an existing IPn.  Although there are multiple such updates
            at most one will be confirmed and, if X is untrunked, its
            original callback parameters will be put in effect by its
            SETCLIENTID_CONFIRM.
          </t>
          <t>
            The procedure described above must be performed so as to exclude
            the possibility that multiple SETCLIENTID's, done to different
            server IP addresses and returning the same clientid4 might "race"
            in such a fashion that there is no explicit determination of
            whether they correspond to the same server.  The following 
            possibilities for serialization are all valid and implementers
            may choose among them based on a tradeoff between performance and
            complexity.  They are listed in order of increasing parallelism:
          <list style='symbols'>
            <t>
              An NFSv4.0 client might serialize all instances of 
              SETCLIENTID/SETCLIENTID_CONFIRM processing, either directly or
              by serializing mount operations involving use of NFSv4.0.
              While doing so will prevent the races mentioned above, this
              degree of serialization can cause performance issues when
              there is a high volume of mount operations.  
            </t>
            <t>
              One might instead serialize the period of processing that begins
              when the clientid4 received from the server is processed and ends
              when all trunking determination for that server is completed.
              This prevents the races mentioned above, without adding to delay
              except when trunking determination is common.
            </t>
            <t>
              One might avoid much of the serialization implied above, by
              allowing trunking determination for distinct clientid4 values
              to happen in parallel, with serialization of trunking 
              determination happening independently for each distinct clientid4
              value.
            </t>
          </list>
          </t>
          <t>
            The procedure above has made no explicit mention of the 
            possibility that server reboot can occur at any time.
            To address this possibility the client should periodically
            use the clientid4 XC in RENEW operations, directed to both
            the IP address X and the current lead IP address that is currently
            being tested for identity.  
          <list style='symbols'>
            <t>
              When XC becomes invalid on X, the resolution process should be
              terminated, subject to being redone later.  Before redoing
              the resolution, XC should be checked on all the lead IP
              addresses on which it was valid.  Once a new clientid4 is 
              established on any servers on which XC became invalid, a new 
              clientid4 can be established on X and the resolution process for
              X can be restarted. 
            </t>
            <t>
              When XC does not becomes invalid on X, but becomes invalid on
              the current IPn being tested, it should be concluded that
              X and IPn do not match and that it is time to advance to the
              next IPn, if any.
            </t>
            <t>
              In the event of a reboot detected on any server lead IP, the
              set of IP addresses associated with the server should not 
              change and 
              state should be re-established for the lease as a whole, 
              using all available connected server IP addresses.  It is
              prudent to verify connectivity by doing a RENEW using the new 
              clientid4 on each such server address before using it, 
              however.
            </t>
          </list>
          </t>
          <t>
             If we have run out of IPn's without finding a matching server,
             X is considered as having no existing 
             known IP addresses trunked with it.  The IP address is marked as
             a lead IP address for a new server.  A SETCLIENTID_CONFIRM
             is done using XC and XV.
          </t>
      </section>
    <section title="Client id string construction details">  
      <t>
        This section gives more detailed guidance on client id construction.
        Note that among the items suggested for inclusion, there are many that 
        may conceivably change.  In order for the client id string to
        remain valid in such circumstances, the client should either:
      <list style='symbols'>
        <t>
          Use a saved copy of such value, 
          rather than the changeable value itself.
        </t>
        <t>
          Save the constructed client id string, rather than constructing it
          anew at SETCLIENTID time, based on unchangeable parameters and
          saved copies of changeable data items. 
        </t>
      </list>
      </t>
      <t>
        A file is not always a valid choice to store such 
        information, given the existence of diskless clients.  
        In such situations, whatever facilities exist for a client
        to store configuration information such as boot arguments 
        should be used. 
      </t>
      <t>
        Given the considerations listed in <xref target="cid-data-items" />, 
        an example of a well generated id string is one that includes:

        <list style='symbols'>
          <t>
            The client's network address, or more safely, an address that has 
            previously been used in that capacity.
          </t>

          <t>
            For a user level NFSv4.0 client, it should contain
            additional information to distinguish the client from other
            user level clients running on the same host, such as a universally
            unique identifier (UUID).
          </t>

          <t>
            Additional information that tends to be unique, such as one
            or more of:

            <list style='symbols'>
              <t>
                The client machine's serial number (for privacy reasons,
                it is best to perform some one way function on the serial
                number).
              </t>

              <t>
                A MAC address.  Note that this can cause difficulties
                when there are configuration changes or when a client has 
                multiple network adapters.
              </t>

              <t>
                The timestamp of when the NFSv4 software was
                first installed on the client (though this is subject to
                the previously mentioned caution about using information
                that is stored in a file, because the file might only be
                accessible over NFSv4).
              </t>
              <t>
                A true random number, generally established once and saved.
              </t>
            </list>
          </t>
        </list>
      </t>

   </section>
</section>
<section anchor="mars-lock" title="Locking and Multi-Server Namespace">
    <t>
      This chapter is a replacement for section  7.7.6, "Lock State and 
      File System transitions", in RFC3530bis (see the draft at
      <xref target="cur-rfc3530-bis" />).
    </t>
    <t>
      With respect to <xref target="RFC3530" />, it serves as a
      replacement for section 8.14, "Migration, Replication, and State".
    </t>
    <t>
      It supersedes the replaced sections.
    </t>
  <section anchor="mars-diffs" title="Changes from Replaced Sections">
    <t>
      These changes can be briefly summarized as follows:
    <list style='symbols'>
       <t>
         Adding text to address the case of stateid conflict on 
         migration.         
       </t>
       <t>
         Specifying that when leases are moved, as a result of
         filesystem migration, they are to be merged with leases
         on the destination server that are connected to the same 
         client.
       </t>
       <t>
         Adding text that deals with the case of a clientid4 being changed
         on state transfer as a result of conflict with an existing
         clientid4.
       </t>
       <t>
         The description of handling of the NFS4ERR_LEASE_MOVED has been 
         rewritten for greater clarity.
      </t>
    </list>
    </t>
  </section>
    <section anchor="mars-transition"
             title="Lock State and File System Transitions">
        <t>
          When responsibility for handling a given filesystem is transferred
          to a new server (migration) or the client chooses to use an
          alternate server (e.g., in response to server unresponsiveness) in
          the context of filesystem replication, the appropriate handling of
          state shared between the client and server (i.e., locks, leases,
          stateids, and client IDs) is as described below.  The handling
          differs between migration and replication.  
       </t>
 
       <t>
         If a server replica or a server immigrating a filesystem agrees
         to, or is expected to, accept opaque values from the client that
         originated from another server, then it is a wise implementation
         practice for the servers to encode the "opaque" values in network
         byte order.  When doing so, servers acting as replicas or immigrating
         filesystems will be able to parse values like stateids, directory
         cookies, filehandles, etc. even if their native byte order is
         different from that of other servers cooperating in the replication 
         and migration of the filesystem.
       </t>

      </section>
      <section title="Migration and State" anchor="mars-lock-migr">

       <t>
         In the case of migration, the servers involved in the migration
         of a filesystem SHOULD transfer all server state associated with 
         the migrating filesystem from source
         to the destination server.  This must be done in a way that is
         transparent to the client.  This state transfer will ease the
         client's transition when a filesystem migration occurs.  If the
         servers are successful in transferring all state, the client
         will continue to use stateids assigned by the original server.
         Therefore the new server must recognize these stateids as valid.
       </t>
       <t>
         If transferring stateids from server to server would result in a 
         conflict for an existing stateid for the destination server with
         the existing client, transparent state migration MUST NOT happen
         for that client.  Servers participating in using transparent 
         state migration should co-ordinate their stateid assignment 
         policies to make
         this situation unlikely or impossible.  The means by which this
         might be done, like all of the inter-server interactions for 
         migration, are not specified by the NFS version 4.0 protocol. 
       </t>
       <t>
         Handling of clientid values is similar but not identical. 
         The clientid4 and nfs_client_id4 information (id string and 
         boot verifier) 
         will be transferred with the rest of the state information and 
         the destination server should use that information to determine 
         appropriate clientid4 handling. Although the destination 
         server may make state stored under an existing
         lease available under the clientid4 used on the source server,
         the client should not assume that this is always so.  In particular,
         
       <list style="symbols">          
         <t>
           If there is an existing lease with an nfs_client_id4 that matches
           a migrated lease (same id string and boot verifier), the server 
           SHOULD merge 
           the two, making the union of the sets of stateids available under 
           the clientid4 for the existing lease.
           As part of the lease merger, the expiration time of the lease will 
           reflect renewal done within either of the ancestor leases (and 
           so will reflect the latest of the renewals).
         </t>
         <t>
           If there is an existing lease with an nfs_client_id4 that partially
           matches a migrated lease (same id string and a 
           different boot verifier), 
           the server MUST eliminate one of the two, possibly invalidating 
           one of the ancestor clientid4's.  
           Since boot verifiers are not ordered, the later lease renewal
           time will prevail.
         </t>
         <t>
           If the destination server already has the transferred clientid4
           in use for another purpose, it is free to substitute a different
           clientid4 and associate that with the transferred nfs_client_id4. 
         </t>
       </list>          
       </t>
       <t>
         When leases are not merged, the transfer of state should result
         in creation of a confirmed client record with empty callback 
         information but matching the {v, x, c} with v and x derived
         from the transferred client information and c chosen by the
         destination server.  This should enable establishment of new
         callback information using SETCLIENTID and SETCLIENTID_CONFIRM.
         The client can determine the new clientid (the value c) from
         the response to SETCLIENTID.
       </t>
       <t>
         A client may determine the disposition of migrated state by
         using a stateid associated with the migrated state on the new 
         server.
       <list style="symbols">          
         <t>
           If the stateid is not valid and an error NFS4ERR_BAD_STATEID is
           received, either transparent state migration has not occurred
           or the state was purged due to boot verifier mismatch.
         </t>
         <t>
           If the stateid is valid, transparent state migration has occurred. 
         </t>
       </list>          
       </t>
       <t>
         Since responsibility
         for an entire filesystem is transferred with a migration event,
         there is no possibility that conflicts will arise on the 
         destination server as a result of the transfer of locks.
       </t>
       <t>
         The servers may choose not to transfer the state information
         upon migration.  However, this choice is discouraged, except
         where specific issues such as stateid conflicts make it necessary.
         In the case of migration without state transfer,
         when the client presents state information from the
         original server (e.g. in a RENEW op or a READ op of zero length),
         the client must be prepared to receive either
         NFS4ERR_STALE_CLIENTID or NFS4ERR_STALE_STATEID from the new
         server.  The client should then recover its state information as
         it normally would in response to a server failure.  The new server
         must take care to allow for the recovery of state information as
         it would in the event of server restart.
       </t>

       <t>
         When a lease is transferred to a new server (as opposed to being
         merged with a lease already on the new server),
         a client SHOULD re-establish new callback information
         with the new server as soon as possible, according to
         sequences described in sections "Operation 35: SETCLIENTID - 
         Negotiate Client ID" and "Operation 36: SETCLIENTID_CONFIRM - 
         Confirm Client ID".  This ensures that server operations 
         are not delayed due to an inability to recall delegations.
       </t>
       <t>
         
       </t>
       <t>
         In those situations in which state has not been transferred,
         as shown by a return of NFS4ERR_BAD_STATEID, the client may
         attempt to reclaim locks in order to take advantage of
         cases in which the
         destination server has set up a file-system-specific grace period
         in support of the migration.
       </t>

     </section>
     <section title="Replication and State">

       <t>
         Since client switch-over in the case of replication is not
         under server control, the handling of state is different.
         In this case, leases, stateids and client IDs do not have validity
         across a transition from one server to another.  The client must
         re-establish its locks on the new server.  This can be compared
         to the re-establishment of locks by means of reclaim-type
         requests after a server reboot.  The difference is that the
         server has no provision to distinguish requests reclaiming locks
         from those obtaining new locks or to defer the latter.  Thus,
         a client re-establishing a lock on the new server (by means of
         a LOCK or OPEN request), may have the requests denied due to a
         conflicting lock.  Since replication is intended for read-only
         use of filesystems, such denial of locks should not pose large
         difficulties in practice.  When an attempt to re-establish a lock
         on a new server is denied, the client should treat the situation
         as if its original lock had been revoked.
       </t>

     </section>
     <section title="Notification of Migrated Lease"
              anchor="mars-lock-notify">
               
       <t>
         A file system can be migrated to another server while a client
         that has state related to that filesystem is not actively submitting
         requests to it.  In this case, the migration is reported to the 
         client during lease renewal.  Lease renewal can occur either 
         explicitly via a RENEW operation, or implicitly when the client 
         performs a lease-renewing operation on another file system on 
         that server.
       </t>

       <t>
         In order for the client to schedule renewal of leases that may
         have been relocated to the new server, the client must find out
         about lease relocation before those leases expire.  Similarly,
         when migration occurs but there has not been transparent state
         migration, the client needs to find out about the change soon
         enough to be able to reclaim the lock within the destination
         server's grace period. 
         To accomplish
         this, all operations which implicitly renew leases for a client
         (such as OPEN, CLOSE, READ, WRITE, RENEW, LOCK, and others),
         will return the error NFS4ERR_LEASE_MOVED if responsibility for
         any of the leases to be renewed has been transferred to a new
         server.  Note that when the transfer of responsibility leaves
         remaining state for that lease on the source server, the lease
         is renewed just as it would have been in the NFS4ERR_OK case,
         despite returning the error.  
         The transfer of responsibility happens when the server receives a 
         GETATTR(fs_locations) from
         the client for each filesystem for which
         a lease has been moved to a new server.  Normally it does this
         after receiving an NFS4ERR_MOVED for an access to the filesystem
         but the server is not required to verify that this happens in
         order to terminate the return of NFS4ERR_LEASE_MOVED.  
         By convention, the compounds containing
         GETATTR(fs_locations) SHOULD include an appended RENEW operation
         to permit the server to identify the client getting the
         information.
       </t>
       <t>
         Note that the NFS4ERR_LEASE_MOVED error is only required 
         when responsibility for at least one stateid has been affected.  
         In the case of a
         null lease, where the only associated state is a clientid, an
         NFS4ERR_LEASE_MOVED error SHOULD NOT be generated.  
       </t>

       <t>
         Upon receiving the NFS4ERR_LEASE_MOVED error, a client that 
         supports filesystem migration MUST perform the necessary GETATTR
         operation for each of the filesystems containing state that 
         have been migrated and so give the server evidence that it is 
         aware of the migration of the filesystem. Once the client has done 
         this for all migrated filesystems on which 
         the client holds state, the server MUST resume normal handling 
         of stateful requests from that client. 
       </t>
       <t>
         One way in which clients can do this efficiently in the presence
         of large numbers of filesystems is described below.  
         This approach divides
         the process into two phases, one devoted to finding the
         migrated filesystems and the second devoted to doing the necessary 
         GETATTRs. 
       </t>
       <t>
         The client can find the migrated filesystems by building and
         issuing one or more 
         COMPOUND requests, each consisting of a set of PUTFH/GETFH
         pairs, each pair using an fh in one of the filesystems in
         question.  All such COMPOUND requests can be done in parallel.  
         The successful completion of such a request indicates that none 
         of the fs's interrogated have been migrated while termination 
         with NFS4ERR_MOVED indicates that the filesystem getting the 
         error has migrated while those interrogated before it in the 
         same COMPOUND have not.  Those whose interrogation follows 
         the error remain in an uncertain state and can be interrogated 
         by restarting the requests from after the point at which 
         NFS4ERR_MOVED was returned or by issuing a new set
         of COMPOUND requests for the filesystems which remain in an 
         uncertain state.
       </t>
       <t>
         Once the migrated filesystems have been found, all that is needed
         is for the client to give evidence to the server that it is aware 
         of the migrated status of filesystems found by this process, by 
         interrogating the fs_locations attribute for an fh within each 
         of the migrated filesystems.  The client can do this by
         building and issuing one or more 
         COMPOUND requests, each of which consists of a  
         set of PUTFH operations, each followed by a GETATTR of 
         the fs_locations attribute.  A RENEW is necessary to enable the
         operations to be associated with the lease returning 
         NFS4ERR_LEASE_MOVED.
         Once the client has done this for all migrated filesystems on which 
         the client holds state, the server will resume normal handling 
         of stateful requests from that client. 
       </t>

       <t>
        In order to support legacy clients that do not handle the
        NFS4ERR_LEASE_MOVED error correctly, the server SHOULD time out after a
        wait of at least two lease periods, at which time it will resume normal
        handling of stateful requests from all clients. If a client attempts to
        access the migrated files, the server MUST reply NFS4ERR_MOVED.  In
        this situation, it is likely that the client would find its lease
        expired although a server may use "courtesy" locks to mitigate the
        issue. 
       </t>

       <t>
         When the client receives an NFS4ERR_MOVED error,
         the client can follow the normal process to obtain the destination 
         server
         information (through the fs_locations attribute) and perform
         renewal of those leases on the new server.
         If the server has not had state transferred to it transparently,
         the client will receive either NFS4ERR_STALE_CLIENTID or 
         NFS4ERR_STALE_STATEID from the new server, as described 
         above. The client can then recover
         state information as it does in the event of server failure.
       </t>
       <t>
         Aside from recovering from a migration, there are other
         reasons a client may wish to retrieve fs_locations information
         from a server.  When a server becomes unresponsive, for
         example, a client may use cached fs_locations data to discover
         an alternate server hosting the same fs data.  A client may
         periodically request fs_locations data from a server in order
         to keep its cache of fs_locations data fresh.
       </t>

       <t>
         Since a GETATTR(fs_locations)
         operation would be used for refreshing cached fs_locations
         data, a server could mistake such a request as
         indicating recognition of an NFS4ERR_LEASE_MOVED condition.
         Therefore a compound which is not intended to signal that
         a client has recognized a migrated lease SHOULD be prefixed
         with a guard operation which fails with NFS4ERR_MOVED if the
         file handle being queried is no longer present on the server.
         The guard can be as simple as a GETFH operation.
       </t>

       <t>
         Though unlikely, it is possible that the target of such a
         compound could be migrated in the time after the guard
         operation is executed on the server but before the
         GETATTR(fs_locations) operation is encountered.  When a
         client issues a GETATTR(fs_locations) operation as part of
         a compound not intended to signal recognition of a migrated
         lease, it SHOULD be prepared to process fs_locations
         data in the reply that shows the current location of the
         fs is gone.
       </t>
      </section>
      <section title="Migration and the Lease_time Attribute">

       <t>
         In order that the client may appropriately manage its leases
         in the case of migration, the destination server must establish
         proper values for the lease_time attribute.
       </t>

       <t>
         When state is transferred transparently, that state should include
         the correct value of the lease_time attribute.  The lease_time
         attribute on the destination server must never be less than that
         on the source since this would result in premature expiration of
         leases granted by the source server.  Upon migration in which state
         is transferred transparently, the client is under no obligation
         to re-fetch the lease_time attribute and may continue to use
         the value previously fetched (on the source server).
       </t>

       <t>
         In the case in which lease merger occurs as part of state transfer,
         the lease_time attribute of the destination lease remains in 
         effect.  The client can simply renew that lease with its existing
         lease_time attribute.  State in the source lease is renewed at
         the time of transfer so that it cannot expire, as long as the
         destination lease is appropriately renewed.       
       </t>
       <t>
         If state has not been transferred transparently (i.e., the client
         needs to reclaim or re-obtain its locks), the client should fetch
         the value of lease_time on the new (i.e., destination) server,
         and use it for subsequent locking requests.  However the server
         must respect a grace period at least as long as the lease_time on
         the source server, in order to ensure that clients have ample
         time to reclaim their locks before potentially conflicting
         non-reclaimed locks are granted.  The means by which the new
         server obtains the value of lease_time on the old server is left
         to the server implementations.  It is not specified by the NFS
         version 4.0 protocol.
       </t>
      </section>
</section>
<section anchor="addl" title="Additional Changes">
  <t>
    This chapter contains a number of items which relate to the changes
    in the chapters above, but which, for one reason or another, exist
    in different portions of the specification to be updated.
  </t>
  <section anchor="addl-diffs" title="Summary of Additional Changes from Previous Documents">
    <t>
      We summarize here all the remaining changes, not included in the two 
      main chapters. 
    <list style='symbols'>
      <t>
        New definition of the CLID_INUSE error.
      </t>
      <t>
        A revised description of SETCLIENTID, which brings the description
        into sync with the rest of the spec regarding CLID_INUSE. 
      </t>
      <t>
        A revision to the Security Considerations section, indicating why 
        integrity
        protection is needed for the SETCLIENTID operation.         
      </t>
    </list>
    </t>
  </section>
  <section anchor="addl-clid-inuse" title="NFS4ERR_CLID_INUSE definition">
     <t>
       The definition of this error is now as follows
     <list style='empty'>
       <t>
         The SETCLIENTID operation has found that the id string
         within the specified nfs_client_id4 was previously presented 
         with a different principal and that client instance 
         currently holds an active lease.  A server MAY return this
         error if the same principal is used but a change in 
         authentication flavor gives good reason to reject the 
         new SETCLIENTID operation as not bona fide. 
       </t>
    </list>
    </t>
  </section>
  <section anchor="OP_SETCLIENTID" title="Operation 35: SETCLIENTID - Negotiate Client ID">

    <section toc="exclude" anchor="OP_SETCLIENTID_SYNOPSIS" title="SYNOPSIS">

      <figure>
        <artwork>
  client, callback, callback_ident -> clientid, setclientid_confirm
        </artwork>
      </figure>

    </section>
    <section toc="exclude" anchor="OP_SETCLIENTID_ARGUMENT" title="ARGUMENT">

      <figure>
        <artwork>
struct SETCLIENTID4args {
        nfs_client_id4  client;
        cb_client4      callback;
        uint32_t        callback_ident;
};
        </artwork>
      </figure>
    </section>
    <section toc="exclude" anchor="OP_SETCLIENTID_RESULT" title="RESULT">


      <figure>
        <artwork>
struct SETCLIENTID4resok {
        clientid4       clientid;
        verifier4       setclientid_confirm;
};

union SETCLIENTID4res switch (nfsstat4 status) {
 case NFS4_OK:
         SETCLIENTID4resok      resok4;
 case NFS4ERR_CLID_INUSE:
         clientaddr4    client_using;
default:
         void;
};
        </artwork>
      </figure>

    </section>
    <section toc="exclude" anchor="OP_SETCLIENTID_DESCRIPTION" title="DESCRIPTION">

      <t>
        The client uses the SETCLIENTID operation to notify the server
        of its intention to use a particular client identifier,
        callback, and callback_ident for subsequent requests that
        entail creating lock, share reservation, and delegation
        state on the server.  Upon successful completion the server
        will return a shorthand client ID which, if confirmed via a
        separate step, will be used in subsequent file locking and
        file open requests. Confirmation of the client ID must be done
        via the SETCLIENTID_CONFIRM operation to return the client ID
        and setclientid_confirm values, as verifiers, to the server.
        The reason why two verifiers are necessary is that it is
        possible to use SETCLIENTID and SETCLIENTID_CONFIRM to modify
        the callback and callback_ident information but not the
        shorthand client ID.  In that event, the setclientid_confirm
        value is effectively the only verifier.
      </t>

      <t>
        The callback information provided in this operation will
        be used if the client is provided an open delegation at a
        future point.  Therefore, the client must correctly reflect
        the program and port numbers for the callback program at the
        time SETCLIENTID is used.
      </t>

      <t>
        The callback_ident value is used by the server on the callback.
        The client can leverage the callback_ident to eliminate the
        need for more than one callback RPC program number, while
        still being able to determine which server is initiating
        the callback.
      </t>

    </section>
    <section toc="exclude" 
             anchor="OP_SETCLIENTID_IMPLEMENTATION" 
                     title="IMPLEMENTATION">

      <t>
        To understand how to implement SETCLIENTID, make the following
        notations. Let:

        <list style='hanging'>
          <t hangText="x">
            be the value of the client.id subfield of the
            SETCLIENTID4args structure.
          </t>

          <t hangText="v">
            be the value of the client.verifier subfield of the
            SETCLIENTID4args structure.
          </t>

          <t hangText="c">
            be the value of the client ID field returned in the
            SETCLIENTID4resok structure.
          </t>

          <t hangText="k">
            represent the value combination of the fields callback and
            callback_ident fields of the SETCLIENTID4args structure.
          </t>

          <t hangText="s">
            be the setclientid_confirm value returned in the
            SETCLIENTID4resok structure.
          </t>

          <t hangText="{ v, x, c, k, s }">
            be a quintuple for a client record. A client
            record is confirmed if there has been a SETCLIENTID_CONFIRM
            operation to confirm it.  Otherwise it is unconfirmed. An
            unconfirmed record is established by a SETCLIENTID call.
          </t>
        </list>
      </t>

     <section toc="exclude" 
              anchor="OP_SETCLIENTID_preparation" 
              title="IMPLEMENTATION (preparatory phase)">
      <t>
        Since SETCLIENTID is a non-idempotent operation, let us assume
        that the server is implementing the duplicate request cache
        (DRC).
      </t>

      <t>
        When the server gets a SETCLIENTID { v, x, k } request,
        it first does a number of preliminary checks as listed below
        before proceeding to the main part of SETCLIENTID processing. 

        <list style='symbols'>
          <t>
            It first looks up the request in the DRC. If there is a
            hit, it returns the result cached in the DRC.  The server
            does NOT remove client state (locks, shares, delegations)
            nor does it modify any recorded callback and callback_ident
            information for client { x }.
          </t>
          <t>
            Otherwise (i.e. in the case of any DRC miss), the server 
            takes the client id string x, and searches for confirmed
            client records for x that the server may have recorded 
            from previous SETCLIENTID calls.  If there are no such, 
            or if all such records have a recorded principal which
            matches that of the current request's principal, then 
          </t>
          <t>
            If there is a confirmed client record with a matching
            client id string and a non-matching principal, the server
            checks the current state of the associated lease.  If there
            is no associated state for the lease, or the lease has expired,
            the server proceeds to the main part of SETCLIENTID
          </t>
          <t>
            Otherwise, the server is being asked to do a SETCLIENTID for a 
            client by a non-matching principal while there is active state
            and the server rejects the SETCLIENTID request
            returning an NFS4ERR_CLID_INUSE error,
            since use of a single client with multiple principals is not 
            allowed.  Note that even though the previously used 
            clientaddr is returned with this error, the use of the same
            id string with multiple clientaddr's is not prohibited,
            while its use with multiple principals is prohibited.
          </t>
        </list>
        </t>
      </section>
      <section toc="exclude" 
               anchor="OP_SETCLIENTID_main" 
               title="IMPLEMENTATION (main phase)">
        <t>
          If the SETCLIENTID has not been dealt with by DRC processing,
          and has not been rejected with an NFS4ERR_CLID_INUSE error,  then
          the main part of SETCLIENTID processing proceeds, as 
          described below.
        <list style='symbols'>

          <t>
            The server checks if it has recorded a confirmed record for
            { v, x, c, l, s }, where l may or may not equal k. If so,
            and since the id verifier v of the request matches that
            which is confirmed and recorded, the server treats this
            as a probable callback information update and records an
            unconfirmed { v, x, c, k, t } and leaves the confirmed { v,
            x, c, l, s } in place, such that t != s. It does not matter
            if k equals l or not.  Any pre-existing unconfirmed { v,
            x, c, *, * } is removed.
          <vspace blankLines='1' />
            The server returns { c, t }. It is indeed returning the
            old clientid4 value c, because the client apparently only
            wants to update callback value k to value l.  It's possible
            this request is one from the Byzantine router that has
            stale callback information, but this is not a problem.
            The callback information update is only confirmed if
            followed up by a SETCLIENTID_CONFIRM { c, t }.
          <vspace blankLines='1' />
            The server awaits confirmation of k via SETCLIENTID_CONFIRM
            { c, t }.
          <vspace blankLines='1' />
            The server does NOT remove client (lock/share/delegation)
            state for x.
          </t>

          <t>
            The server has previously recorded a confirmed { u, x, c,
            l, s } record such that v != u, l may or may not equal k,
            and has not recorded any unconfirmed { *, x, *, *, * }
            record for x.  The server records an unconfirmed { v, x,
            d, k, t } (d != c, t != s).
          <vspace blankLines='1' />
            The server returns { d, t }.
          <vspace blankLines='1' />
            The server awaits confirmation of { d, k } via
            SETCLIENTID_CONFIRM { d, t }.
          <vspace blankLines='1' />
            The server does NOT remove client (lock/share/delegation)
            state for x.
          </t>

          <t>
            The server has previously recorded a confirmed { u, x, c,
            l, s } record such that v != u, l may or may not equal k,
            and recorded an unconfirmed { w, x, d, m, t } record such
            that c != d, t != s, m may or may not equal k, m may or may
            not equal l, and k may or may not equal l. Whether w == v
            or w != v makes no difference.  The server simply removes
            the unconfirmed { w, x, d, m, t } record and replaces it
            with an unconfirmed { v, x, e, k, r } record, such that e !=
            d, e != c, r != t, r != s.
          <vspace blankLines='1' />
            The server returns { e, r }.
          <vspace blankLines='1' />
            The server awaits confirmation of { e, k } via
            SETCLIENTID_CONFIRM { e, r }.
          <vspace blankLines='1' />
            The server does NOT remove client (lock/share/delegation)
            state for x.
          </t>

          <t>
            The server has no confirmed { *, x, *, *, * } for x. It
            may or may not have recorded an unconfirmed { u, x, c,
            l, s }, where l may or may not equal k, and u may or may
            not equal v.  Any unconfirmed record { u, x, c, l, * },
            regardless whether u == v or l == k, is replaced with an
            unconfirmed record { v, x, d, k, t } where d != c, t != s.
          <vspace blankLines='1' />
            The server returns { d, t }.
          <vspace blankLines='1' />
            The server awaits confirmation of { d, k } via
            SETCLIENTID_CONFIRM { d, t }.  The server does NOT remove
            client (lock/share/delegation) state for x.
          </t>
        </list>
      </t>

      <t>
        The server generates the clientid and setclientid_confirm
        values and must take care to ensure that these values are
        extremely unlikely to ever be regenerated.
      </t>

      </section>
    </section>
  </section>
  <section anchor="misc-security"
           title="Security Considerations revision">
    <t>
      The last paragraph of the "Security Considerations" section 
      should be revised to read as follows:
    <list style='empty'>
      <t>
        Because the operations SETCLIENTID/SETCLIENTID_CONFIRM are
        responsible for the release of client state, it is imperative 
        that the principal used for these operations is checked against 
        and match the previous use of these operations.  In addition,
        use of integrity protection is desirable on the SETCLIENTID
        operation, to prevent an attack whereby a change in the boot 
        verifier forces an undesired loss of client state. 
        See the section "Client Identity Definition" for further 
        discussion.
      </t>
    </list>
    </t>
  </section>
</section>
  <section anchor="security" title="Security Considerations">
     <t>
       Is modified as specified in <xref target="misc-security" />.
     </t>
  </section>
  <section title="IANA Considerations">
      <t>s
        This document does not require actions by IANA.
      </t>
   </section>        
   <section title="Acknowledgements">
      <t>
        The editor and authors of this document gratefully acknowledge
        the contributions of
        Trond Myklebust of NetApp and Robert Thurlow of Oracle.
        We also thank
        Tom Haynes of NetApp and Spencer Shepler of Microsoft
        for their guidance and suggestions.
      </t>
      <t>
        Special thanks go to members of the Oracle Solaris NFS team, especially
        Rick Mesta and James Wahlig,
        for their work implementing an NFSv4.0 migration prototype and identifying
        many of the issues documented here.
      </t>
  </section>
  </middle>
  <back>
        <references title="Normative References">
      &RFC2119;
      &RFC3530;
        </references>

        <references title="Informative References">
      &RFC1813;
      &RFC5661;
        <reference anchor="cur-rfc3530-bis" 
                   target="http://www.ietf.org/id/draft-ietf-nfsv4-rfc3530bis-21.txt">
        <front>
          <title>Network File System (NFS) Version 4 Protocol</title>

          <author role="editor" initials="T." surname="Haynes">
            <organization>NetApp</organization>
          </author>
          <author role="editor" initials="D." surname="Noveck">
            <organization>EMC</organization>
          </author>

          <date year="2012" />
        </front>
        <annotation>
          Work in progress.
        </annotation>
        </reference>
        <reference anchor="info-migr"
                   target="http://www.ietf.org/id/draft-ietf-nfsv4-migration-issues-02.txt">
        <front>
          <title>
            NFSv4 migration: Implementation experience and spec issues to resolve
          </title>
          <author role="editor" initials="D." surname="Noveck">
            <organization>EMC</organization>
          </author>
          <author initials="P." surname="Shivam">
            <organization>ORACLE</organization>
          </author>
          <author initials="C." surname="Lever">
            <organization>ORACLE</organization>
          </author>
          <author initials="B." surname="Baker">
            <organization>ORACLE</organization>
          </author>
          <date year="2012" />
        </front>
        <annotation>
          Work in progress.
        </annotation>
        </reference>
        </references>
    </back>
</rfc>

