|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Progress report from the ISCSI Group Test Period - Login is uglyThree rounds of interoperability testing have been completed and the group of 30 companies is now in a debugging mode. The main problem points came up quickly and they are: login, login, and login. A short summary of the issues follows, detailed descriptions will be posted for list review: 1. CmdSN - If a login PDU is sent with CMDSN=5 and the next command is in the full feature phase is the CmdSN of that PDU 5 or 6? For the current test period we have chosen to use simply increment CmdSN. (we will send 6) 2. InitStatSN - This is essentially the same issue as CmdSN, however there is complexity with the multiple StatSNs that can come back as a result of the partial login response. The plan for the current test period is to treat this differently then CmdSN and use the value given in InitStatSN. This is in no way a reflection of what the implementers desired in future revs. of the specification. 3. There was mixed implementations in terms of the usage of the F bit in Command frames. Some following wording in rev 6 and some following wording in 6-96. 4. There was a lack of consistency in understanding what a "list" was. Key=value pairs such as InitialR2T = no were in some cases interpreted as list items and in some cases as something else ("binary options"). If the item was viewed as a list, then the expected form was initialR2T=no,yes. The implied meaning being that the device wanted to send initial data without an R2T, but supported the use of R2Ts. A device that sent initialR2T=no was understood to be saying "I will only work with devices that can accept initial write data w/o an R2T." In this view that default value only implies what is used if the key is missing from the negotiation. The other (major) view was that there are more things then lists and numeric keys. In this case the initialr2t=no is not a list and does not need to have all supported options with it. 5. Dependent keys - If a device does not like the value for a dependent parameter, such as IFMarkInt, that depends on FMarker, how is this handled? 6. What is the proper way for a target to force security negotiation when the initiator moves directly to operation phase? Does it reject the login and terminate the connection? or does it send Security parameters back anyways? 7. A number of vendors were not expecting the target to be able to initiate new key=value pairs. 8. During the security phase of login operational parameters may be ignored. There were different views as to what this implied (not sending the key=value pairs back, sending the values back but ignoring them once operation negotiation phase was entered. 9. The standard requires that key=value entries be "separated" by nulls. This means that the last one does not have to have a null. There was universal desire for all key=values to be terminated by a null. 10. Is the setting of F=1 persistent? If the initiator sends F=1 and the target comes back with new parameters is the initiator allowed to withdraw the F=1 setting in the next PDU it send. The large number of views on what the draft says relative to login suggest that we need to have more precise login behavior documentation. In particular a state table with well defined actions for the transitions between states should be specifies. The current draft 6-96 has a table, but lacks transition actions. The key=value negotiation process such employ a formal grammar the applied a well defined meaning to each of the identifiers and fixed the syntactical expressions. Barry Reinhold Principal Architect Trebia Networks barry.reinhold@trebia.com 603-868-5144/603-659-0885/978-929-0830 x???
Home Last updated: Tue Sep 04 01:04:17 2001 6315 messages in chronological order |