<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-nfsv4-nfs-acl-00" category="info" submissionType="IETF" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="NFS ACL Protocol">The Network File System Access Control List Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-nfsv4-nfs-acl-00"/>
    <author fullname="Chuck Lever" role="editor">
      <organization abbrev="Oracle">Oracle Corporation</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>chuck.lever@oracle.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="31"/>
    <area>Web and Internet Transport</area>
    <workgroup>Network File System Version 4</workgroup>
    <keyword>NFS</keyword>
    <keyword>ACL</keyword>
    <abstract>
      <?line 90?>

<t>This Informational document describes the NFS_ACL protocol.
NFS_ACL is a legacy member of the Network File System family
of protocols that NFS clients use to view and update Access
Control Lists stored on an NFS version 2 or version 3 server.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://chucklever.github.io/i-d-nfs-acl/draft-ietf-nfsv4-nfs-acl.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-nfsv4-nfs-acl/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Network File System Version 4 Working Group mailing list (<eref target="mailto:nfsv4@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/nfsv4/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/nfsv4/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/chucklever/i-d-nfs-acl"/>.</t>
    </note>
  </front>
  <middle>
    <?line 98?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Network File System protocol (NFS) was introduced by Sun
Microsystems in the 1980s. This protocol enabled applications
to access and modify files, via local POSIX system interfaces,
that reside on a remote host <xref target="RFC1094"/>.</t>
      <t>Traditionally, permission to access files stored in NFS file
systems is granted by permission bits, mimicking <xref target="POSIX"/>.
Permission bits provide coarse-grained access control. The
file owner can control only whether members of her group can
read, write, or execute the file contents, or whether anyone
else (without exception) has those rights.</t>
      <t>An Access Control List, or ACL, is a mechanism that enables
file owners to grant specific users fine-grained access
rights to file content <xref target="IEEE"/>.</t>
      <t>Version 2 of NFS is described in <xref target="RFC1094"/>, and version 3
in <xref target="RFC1813"/>. Neither of these protocols include a method
for managing ACLs associated with files shared via the NFS
protocol, even though the local file systems shared via NFS
often implemented ACLs and gave local users mechanisms to
read and update them.</t>
      <t>Sun created the NFS_ACL protocol to provide that mechanism
for files accessed remotely via NFS. Later, other operating
systems, including Linux, implemented NFS_ACL for similar
reasons.</t>
      <t>This document describes the protocol based on the nfs_acl.x
file that is publicly available in the OpenSolaris
code base <xref target="OpenSolaris"/>. The editor has attempted to
introduce no changes to the protocol as it is implemented
in those operating systems and in Linux.</t>
      <t>The document assumes readers are already familiar with the
NFS version 2 or 3 protocols and at least one implementation
of them.</t>
      <t>Issues of compatibility between the protocol described in
this document and NFSv4 ACLs (as described by <xref target="RFC8881"/>)
are considered out of scope. More information on this topic
is available in Section 6 of draft-rmacklem-nfsv4-posix-acls.</t>
      <t>Local file systems on NFSv2 and NFSv3 servers determine the
particular semantics of each Access Control List -- in other
words, how the server uses each Access Control List to
authorize access to file content. This document serves only
as a description of the network protocol used to exchange
ACLs between NFS clients and servers.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>As with most publications by standards bodies, this document
has been published so that people may continue to create
compatible implementations. However, note that, as an
Informational document, this RFC does not make any compliance
mandates on implementations of the protocol described herein.</t>
    </section>
    <section anchor="general-concepts">
      <name>General Concepts</name>
      <section anchor="a-glossary-of-useful-terms">
        <name>A Glossary of Useful Terms</name>
        <t>The following are a set of foundational terms used throughout
this document.</t>
        <dl>
          <dt>application:</dt>
          <dd>
            <t>A program that executes on a client system.</t>
          </dd>
          <dt>client:</dt>
          <dd>
            <t>A computer system that utilizes compute resources provided by one or
more servers.</t>
          </dd>
          <dt>file:</dt>
          <dd>
            <t>A unit of data storage consisting of an ordered stream of
bytes and a set of metadata attributes.</t>
          </dd>
          <dt>gid:</dt>
          <dd>
            <t>A 32-bit unsigned integer that represents a group of users.</t>
          </dd>
          <dt>server:</dt>
          <dd>
            <t>A computer system that provides compute resources to network peers.</t>
          </dd>
          <dt>uid:</dt>
          <dd>
            <t>A 32-bit unsigned integer that represents a specific user.</t>
          </dd>
          <dt>user:</dt>
          <dd>
            <t>A person logged in on a client system.</t>
          </dd>
        </dl>
      </section>
      <section anchor="remote-procedure-call">
        <name>Remote Procedure Call</name>
        <t>The Sun Remote Procedure Call (SunRPC) protocol provides a
procedure-oriented interface to remote services. Each server
supplies a program, which is a set of procedures. The NFS
service is one such program. The combination of host address,
program number, version number, and procedure number specify one
remote service procedure.  Servers can support multiple versions
of a program that are accessed using different protocol version
numbers.</t>
        <t>The NFS and NFS_ACL protocols are both based on SunRPC. The
remainder of this document assumes an NFS environment that is
implemented on top of SunRPC, as it is specified in <xref target="RFC5531"/>.</t>
      </section>
      <section anchor="external-data-representation">
        <name>External Data Representation</name>
        <t>The eXternal Data Representation (XDR) specification provides a
standard way of representing a set of data types on a network.
XDR addresses the problem of communication between network
peers with different byte orders, structure alignment, and data
type representation.</t>
        <t>This document utilizes the RPC Data Description Language to
specify the XDR format arguments and results to each of the RPC
service procedures that an NFS_ACL server provides.</t>
        <t>Readers can find a full guide to XDR and the RPC Data Description
Language in <xref target="RFC4506"/>.</t>
        <section anchor="extensions-to-rfc-4506">
          <name>Extensions to RFC 4506</name>
          <t>The original NFS_ACL version 2 RPC language specification includes the use of
the "unsigned short" type. This type is not described in <xref target="RFC4506"/>. However,
most current implementations of the rpcgen program implement support for
this type. This section provides a proper specification for "short" and
"unsigned short" integer types for the RPC language, based on those
implementations. This is so that the NFS_ACL version 2 RPC language
specification appearing in this document accurately reflects the wire behavior
of existing implementations.</t>
          <t>The XDR wire representation of both types is a network-endian 32-bit integer,
sign-extended. This maintains XDR's consistent 4-octet alignment for all basic
integer types while allowing applications to use narrower types internally.</t>
          <section anchor="unsigned-short">
            <name>unsigned short</name>
            <t>The unsigned short type is aero-extended, with the high-order two octets each
containing zeroes on the wire. The value range of this type is zero to 65,535,
inclusive.</t>
            <t>Example: 0xFFFF (65535) appears as 0x0000FFFF on the wire.</t>
          </section>
          <section anchor="signed-short">
            <name>signed short</name>
            <t>The short type is sign-extended, with the high-order two octets replicating
the sign bit. The value range of this type is -32768 to 32767, inclusive.</t>
            <t>When a signed short contains a positive or zero value, its high-order octets
each contain 0x00. For example: 0x7FFF (32767) appears as 0x00007FFF on the
wire.</t>
            <t>When a signed short contains a negative value, its high-order octets each
contain 0xFF. For example: 0xFFFF (-1) appears as 0xFFFFFFFF on the wire,
and 0x8000 (-32768) appears as 0xFFFF8000 on the wire.</t>
          </section>
        </section>
      </section>
      <section anchor="authentication-and-authorization">
        <name>Authentication and Authorization</name>
        <t>The RPC protocol includes fields in every procedure call for
user authentication parameters. The specific content of the
authentication parameters is determined by the type of
authentication used by the server and client. A discussion
of the mechanics of RPC user authentication appears in
<xref target="RFC5531"/>, in particular Sections 9 and 10.</t>
        <t>For NFS ACLs, the user ID carried in RPC calls is used
for two purposes:</t>
        <ul spacing="normal">
          <li>
            <t>When setting an ACL via the SETACL procedure or retrieving
an ACL via the GETACL procedure, the NFS_ACL service verifies
that the calling user has been granted permission to perform
the procedure.</t>
          </li>
          <li>
            <t>Each Access Control Entry (see below) contains an element
that identifies the user to which the ACE applies. That
user is represented by a 32-bit user ID. The value of the
user ID in each ACE has the same meaning and mapping as
the value of incoming RPC calls.</t>
          </li>
        </ul>
        <t>Using user ids and group ids implies that the client and
server either share the same ID list or do local user and
group ID mapping. Servers and clients must agree on the
mapping from user to uid and from group to gid, for those
sites that do not implement a consistent user ID and group
ID number space. In practice, such mapping is typically
performed on the server, following a static mapping scheme
or a mapping established by the user from a client at
mount time.</t>
        <t>RPCSEC_GSS authentication provides stronger
security through the use of cryptographic authentication.
The server and client must agree on the mapping of the
user's GSS principal to a local UID on the server, but
the name to identity mapping is more operating system
independent than the uid and gid mapping in AUTH_UNIX.</t>
      </section>
      <section anchor="file-access-control">
        <name>File Access Control</name>
        <t>This section describes the abstractions that an NFS server
uses to determine whether an access or modification
to a file is permitted. The exact behavior of a server
implementation may vary.</t>
        <section anchor="file-ownership">
          <name>File Ownership</name>
          <t>A file’s "owner" is the designated user that is always granted
permission to update that file’s security attributes. As part of
creating a file, the NFS server assigns the file’s owner. Under
normal circumstances the initial file owner is the RPC user who
issued the NFS CREATE procedure. However, server security policies
can mandate replacement of that user (also known as user squashing)
as part of processing a CREATE procedure.</t>
          <t>An existing file’s designated owner can subsequently be changed by
an NFS SETATTR procedure. After that change, the new owner is
granted permission to update the file’s security attributes and
the old owner is no longer treated specially.</t>
          <t>A file’s "owner group" is a short list of users that have
similar privileges as the file’s owner, but are treated as a
separate category for the purpose of permission checking.</t>
          <t>Any user who is not a file's owner or a member of its owner
group falls into the third category, known as "everyone" or
"other".</t>
          <section anchor="superuser-access">
            <name>Superuser Access</name>
            <t>On most operating systems, there is a category of users known as
privileged users or superusers. These users can bypass most or
all access controls on files.</t>
          </section>
        </section>
        <section anchor="categories-of-access">
          <name>Categories of Access</name>
          <t>In NFS versions 2 and 3, there are three rudimentary categories
of access:</t>
          <dl>
            <dt>Read access:</dt>
            <dd>
              <t>Read access grants permission for a user to read a file or
directory.</t>
            </dd>
            <dt>Write access:</dt>
            <dd>
              <t>Write access grants permission for a user to modify a file
or directory.</t>
            </dd>
            <dt>Execute access:</dt>
            <dd>
              <t>For a file, execute access grants permission for the user to
treat the file content as executable. For a directory object,
execute access grants permission for the user to perform a
lookup in that directory.</t>
            </dd>
          </dl>
        </section>
        <section anchor="traditional-permission-bits">
          <name>Traditional Permission Bits</name>
          <t>Permission bits, or mode bits, are the simplest and perhaps
oldest form of access control. Each file object has a set
of mode bits <xref target="POSIX"/>.</t>
          <t>Each of the user categories is given a set of three access
type bits. Altogether there are then nine bit flags for
every file object.</t>
        </section>
        <section anchor="access-control-lists">
          <name>Access Control Lists</name>
          <t>An Access Control Entry, or ACE, represents a set of access categories
and a specific user or group. An Access Control List is a list of ACEs.</t>
          <t>Mode bits, as explained in the previous section, are essentially an
ACL that always contains exactly three ACEs: one for the file's owner,
one for the file's owner group, and one for everyone else.</t>
          <section anchor="interpreting-access-control-lists">
            <name>Interpreting Access Control Lists</name>
            <t>NFS clients do not perform access checks based on their
interpretation of an ACL read from the server. NFS servers
are solely responsible for authorizing and restricting
access to file content via the NFS protocol.</t>
            <t>An NFS Access Control List is a list of three or more
Access Control Entries (ACEs) associated with one file
system object. Each Access Control Entry in this list
specifies a user and a set of access types granted to
that user.</t>
            <t>Only ACEs that match the requester are considered. Each
ACE is processed until all of the bits of the requester's
access have been ALLOWED. Once a bit has been ALLOWED,
that bit is no longer considered in the processing
of subsequent ACEs in the list.</t>
            <t>When the ACL has been fully processed, if there are bits
in the requester's mask that have not been ALLOWED,
access of that type is denied.</t>
            <t>Note that an ACL might not be the sole determiner of access. For example:</t>
            <ul spacing="normal">
              <li>
                <t>In the case of a file system exported as read-only,
the server may deny write access even though an object's
ACL grants it.</t>
              </li>
              <li>
                <t>Server implementations can grant some limited permission
to update an ACL in order to prevent a situation from
rising in which there is no valid way to ever modify the ACL.</t>
              </li>
              <li>
                <t>All servers will allow a user the ability to read the
data of the file when only the execute permission is granted
(i.e., if the ACL denies the user the NA_READ access and
allows the user NA_EXEC, the server will allow the user to
read the data of the file).</t>
              </li>
              <li>
                <t>Some server implementations have the notion of
owner-override, in which the owner of the object is allowed
to override accesses that are denied by the ACL. This can be
helpful, for example, to allow users continued access to
open files on which the permissions have changed.</t>
              </li>
              <li>
                <t>Some server implementations have the notion of a
"superuser" that has privileges beyond an ordinary user.
The superuser may be able to read or write data or metadata
in ways that would otherwise not be permitted by the object's
ACL.</t>
              </li>
            </ul>
            <t>NFS clients can use either the NFS_ACL version 2 ACCESS
procedure or the NFS version 3 ACCESS procedure to ask the
server to perform an access check based on the requesting
user and the ACL present on a file system object. Clients are
also free to simply try an operation to see what works, then
recover it the server denies access.</t>
          </section>
          <section anchor="acls-in-operation">
            <name>ACLs in Operation</name>
            <t>The SETACL procedure sets two types of Access Control Lists:</t>
            <dl>
              <dt>Access:</dt>
              <dd>
                <t>An NFS access ACL specifies the access permission
for a file object. Access Control Entries in an ACL's
"aclent" field comprise the object's access ACL.</t>
              </dd>
              <dt>Default:</dt>
              <dd>
                <t>An NFS default ACL specifies the default ACL that
is set on objects that are children of a directory.
Access Control Entries in an ACL's "dfaclent" comprise
an object's default ACL. The default ACL does not affect
access to the object on which it is set.</t>
              </dd>
            </dl>
            <t>Each NFS ACL must have one ACE for each of
NA_USER_OBJ, NA_GROUP_OBJ, and NA_OTHER_OBJ.
An NFS ACL that consists only of these
three ACEs is referred to as a minimal NFS ACL.</t>
            <t>An NFS ACL may zero or more NA_USER and/or NA_GROUP
ACEs.</t>
            <t>When a client presents a SETACL operation that a server
finds is invalid or it cannot process, the server responds
with ACL2ERR_IO or ACL3ERR_INVAL, depending on the version
of NFS_ACL that is in use. ACLs that are not valid include:</t>
            <ul spacing="normal">
              <li>
                <t>The presented ACL does not contain one ACE for each of
NA_USER_OBJ, NA_GROUP_OBJ, and NA_OTHER_OBJ</t>
              </li>
              <li>
                <t>The presented ACL is a default ACL but the target object
is not a directory</t>
              </li>
              <li>
                <t>The presented ACL contains too many ACEs</t>
              </li>
              <li>
                <t>The presented ACL's type field contains more than one
set bit</t>
              </li>
            </ul>
            <aside>
              <t>cel: What does the NA_ACL_DEFAULT bit do?</t>
            </aside>
            <aside>
              <t>rthurlow: In the Solaris acl(2)/facl(2) system calls, the
equivalently-defined ACL_DEFAULT is used after aclent
sorting to note where regular entries end and where default
entries start in a single list.  So perhaps it would be
normal for the dfaclent entries to all be so marked.</t>
            </aside>
            <t>The "id" field in an Access Control Entry is interpreted as follows:</t>
            <ul spacing="normal">
              <li>
                <t>For an ACE that specifies an NA_USER_OBJ, NA_USER,
NA_GROUP, and NA_GROUP_OBJ, the "id" field contains
a UID or GID value that identifies the user on the
server whose access permission is being set.</t>
              </li>
              <li>
                <t>For an ACE that specifies other types of permission,
the "id" field is ignored.</t>
              </li>
            </ul>
          </section>
          <section anchor="relationship-between-acls-and-other-file-attributes">
            <name>Relationship Between ACLs and Other File Attributes</name>
            <t>When an ACL is present on a file, the ACL controls the
requesting user's access to the file. Typically the NFS
server ignores the file's mode bits.</t>
            <t>Depending on the behavior of the local file system
implementation, changing the file's ACL via the SETACL
procedure may alter the file's mode bits, and changing
the mode bits via the SETATTR procedure may alter the
content of the ACL in any way. NFS clients should
refresh cached ACLs or file modes after one of these
operations.</t>
            <t>When an ACL is present on a file, changing the file's owner
(say, via the SETATTR operation) may alter the server's
interpretation of any ACE that targets NA_USER_OBJ.</t>
            <t>When an ACL is present on a file, changing the file's group
(say, via the SETATTR operation) may alter the server's
interpretation of any ACE that targets NA_GROUP_OBJ.</t>
            <t>If an NFS client observes that a file's ctime attribute
has changed, it should assume that any ACLs that are
present might have been modified.</t>
          </section>
          <section anchor="acl-inheritance">
            <name>ACL Inheritance</name>
            <aside>
              <t>Section needs to explain how default ACLs work and what
impact they may have on the mode bits of the new file.</t>
            </aside>
            <t>A client uses one of the NFS CREATE, MKDIR, or MKNOD procedures
to request instantiatiation of a new file object. The server uses
the default ACL from the parent directory as the initial access
ACL on the new object.</t>
          </section>
          <section anchor="historical-references">
            <name>Historical References</name>
            <t>The section entitled "The POSIX 1003.1e/1003.2c Working Group"
in <xref target="Gruenbacher"/> details the history of POSIX standards efforts
with regard to file access control. The editor recommends that
readers familiarize themselves with the extent to which POSIX
specifies the content and behavior of ACLs.</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="protocol-elements-common-to-both-versions">
      <name>Protocol Elements Common to Both Versions</name>
      <section anchor="rpc-authentication">
        <name>RPC Authentication</name>
        <t>The NFS_ACL service uses AUTH_NONE in the NULL procedure.
All RPC authentication flavors may be used for other procedures.</t>
      </section>
      <section anchor="constants">
        <name>Constants</name>
        <t>These are the RPC constants needed to call the NFS Version 3
service.  They are given in decimal.</t>
        <dl>
          <dt>100227</dt>
          <dd>
            <t>The RPC program number for the NFS_ACL protocol</t>
          </dd>
        </dl>
        <t>Only versions 2 and 3 of this RPC program are valid.</t>
      </section>
      <section anchor="transport-address">
        <name>Transport address</name>
        <t>The NFS_ACL protocol can operate over the TCP, UDP, and RDMA
transport protocols.
For TCP and UDP, it uses port 2049, and for RDMA, it uses 20049.
In both cases, this is the same as the base NFS protocol.</t>
      </section>
      <section anchor="sizes">
        <name>Sizes</name>
        <sourcecode type="xdr"><![CDATA[
NFS_ACL_MAX_ENTRIES 1024
]]></sourcecode>
        <t>The maximum number of Access Control Entries allowed in one Access Control List array.</t>
      </section>
      <section anchor="basic-data-types">
        <name>Basic Data Types</name>
        <t>The following XDR definitions are basic scalar types that are used in other structures.</t>
        <sourcecode type="xdr"><![CDATA[
typedef unsigned int uid;
]]></sourcecode>
        <sourcecode type="xdr"><![CDATA[
typedef unsigned short o_mode;
]]></sourcecode>
      </section>
      <section anchor="structured-data-types">
        <name>Structured Data types</name>
        <t>The following XDR definitions are common structured data types
that are used in all versions of the NFS_ACL protocol.</t>
        <section anchor="aclent">
          <name>aclent</name>
          <t>This structure represents a single entry in an Access Control List.</t>
          <sourcecode type="xdr"><![CDATA[
struct aclent {
    int type;
    uid id;
    o_mode perm;
};
]]></sourcecode>
          <t>The "type" element in an Access Control Entry is a bit mask.
The bit field values in this mask are defined as follows:</t>
          <sourcecode type="xdr"><![CDATA[
const NA_USER_OBJ = 0x1;        /* object owner */
const NA_USER = 0x2;            /* additional users */
const NA_GROUP_OBJ = 0x4;       /* owning group of the object */
const NA_GROUP = 0x8;           /* additional groups */
const NA_CLASS_OBJ = 0x10;      /* file group class and mask entry */
const NA_OTHER_OBJ = 0x20;      /* other entry for the object */
const NA_ACL_DEFAULT = 0x1000;  /* default flag */
]]></sourcecode>
          <t>The "perm" element in an Access Control Entry is also a bit mask.
The bit field values in this mask are defined as follows:</t>
          <sourcecode type="xdr"><![CDATA[
const NA_READ = 0x4;            /* read permission */
const NA_WRITE = 0x2;           /* write permission */
const NA_EXEC = 0x1;            /* exec permission */
]]></sourcecode>
        </section>
        <section anchor="secattr">
          <name>secattr</name>
          <t>The secattr structure represents, on the wire, the full Access Control
List for one file system object. This list contains an array of
Access Control Entries that apply to the object, plus an array of
default Access Control Entries that are inherited by the object's
children.</t>
          <sourcecode type="xdr"><![CDATA[
struct secattr {
    unsigned int mask;
    int aclcnt;
    aclent aclent<NFS_ACL_MAX_ENTRIES>;
    int dfaclcnt;
    aclent dfaclent<NFS_ACL_MAX_ENTRIES>;
};
]]></sourcecode>
          <t>The "mask" element of the secattr structure is a bit mask. The
bit field vvalues in this mask are defined as follows:</t>
          <sourcecode type="xdr"><![CDATA[
const NA_ACL = 0x1;         /* aclent contains a valid list */
const NA_ACLCNT = 0x2;      /* number of entries in the aclent list */
const NA_DFACL = 0x4;       /* dfaclent contains a valid list */
const NA_DFACLCNT = 0x8;    /* number of entries in the dfaclent list */
]]></sourcecode>
          <t>These bit field values are also used in the "mask" element of the
GETACL2args and GETACL3args structures.</t>
        </section>
        <section anchor="interoperability-considerations">
          <name>Interoperability Considerations</name>
          <t>Interoperability between NFS peers that do not implement
the NFS_ACL protocol is what we already have today.
Interoperability between peers that both implement the NFS_ACL
protocol is described in the rest of this document.</t>
          <t>The following subsections briefly discuss three new
interoperability scenarios.</t>
          <section anchor="client-implements-nfsacl-server-does-not">
            <name>Client Implements NFS_ACL, Server Does Not</name>
            <t>Typically an NFS server that implements the NFS_ACL program will
advertise the presence of NFS_ACL via an rpcbind registration.
An NFS client that implements NFS_ACL should perform an rpcbind
query before attempting any NFS_ACL procedure <xref target="RFC1833"/>.</t>
            <t>If the client sends any NFS_ACL procedure without sending an
rpcbind query first, and the server does not implement the
NFS_ACL program, the server responds with an RPC access_stat
of PROG_UNAVAIL.</t>
          </section>
          <section anchor="server-implements-nfsacl-client-does-not">
            <name>Server Implements NFS_ACL, Client Does Not</name>
            <t>An NFS server that implements advanced access control can
deny requests made by a client by responding with
NFS2ERR_ACCESS or NFS3ERR_ACCESS status codes, and an
NFS client has no visibility as to why the denial occurred.
Neither can that client send operations to update
the access control on file objects.</t>
            <t>This is a quality of implementation issue for the client.</t>
          </section>
          <section anchor="client-implements-exported-file-system-does-not">
            <name>Client Implements, Exported File System Does Not</name>
            <t>An NFS server that implements the NFS_ACL protocol might
share both file systems that implement ACLs and
file systems that do not. In this case, NFS clients
detect the presence of an NFS_ACL service on the NFS
server.</t>
            <t>For file objects that do not implement ACL support:</t>
            <ul spacing="normal">
              <li>
                <t>The server responds to a GETACL procedure by returning
a manufactured minimal ACL (ie., only three ACEs) that
reflects the current mode bits of the object.</t>
              </li>
              <li>
                <t>The server responds to a SETACL version 3 procedure by
returning ACL3ERR_NOTSUPP.</t>
              </li>
            </ul>
            <aside>
              <t>Linux returns NFS3ERR_NOTSUPP even for NFS_ACLv2. Check Solaris.</t>
            </aside>
          </section>
        </section>
      </section>
    </section>
    <section anchor="nfsacl-version-2">
      <name>NFS_ACL Version 2</name>
      <t>Version 2 of the NFS_ACL protocol is used in conjunction only with
version 2 of the NFS protocol.</t>
      <section anchor="data-types-inherited-from-nfs-version-2">
        <name>Data types inherited from NFS version 2</name>
        <section anchor="ftype">
          <name>ftype</name>
          <t>The enumeration "ftype" gives the type of an NFS version 3 file.
This definition comes from <xref section="2.3.2" sectionFormat="of" target="RFC1094"/>:</t>
          <sourcecode type="xdr"><![CDATA[
enum ftype {
    NFNON = 0,
    NFREG = 1,
    NFDIR = 2,
    NFBLK = 3,
    NFCHR = 4,
    NFLNK = 5
};
]]></sourcecode>
        </section>
        <section anchor="fhandle">
          <name>fhandle</name>
          <t>NFS version 2 uses a fixed-size file handle. The following definition
comes from <xref section="2.3.3" sectionFormat="of" target="RFC1094"/>:</t>
          <sourcecode type="xdr"><![CDATA[
const FHSIZE = 32;

typedef opaque fhandle[FHSIZE];
]]></sourcecode>
        </section>
        <section anchor="timeval">
          <name>timeval</name>
          <t>NFS version 2's "timeval" structure represents the number of seconds
and microseconds since midnight January 1, 1970, Greenwich Mean Time.
This definition comes from <xref section="2.3.4" sectionFormat="of" target="RFC1094"/>:</t>
          <sourcecode type="xdr"><![CDATA[
struct timeval {
    unsigned int seconds;
    unsigned int useconds;
};
]]></sourcecode>
        </section>
        <section anchor="nfsfattr">
          <name>nfsfattr</name>
          <t>This document refers to NFS version 2's file attribute structure
as "nfsfattr". This is the same as the fattr structure described
in <xref section="2.3.5" sectionFormat="of" target="RFC1094"/>:</t>
          <sourcecode type="xdr"><![CDATA[
struct fattr {
    ftype        type;
    unsigned int mode;
    unsigned int nlink;
    unsigned int uid;
    unsigned int gid;
    unsigned int size;
    unsigned int blocksize;
    unsigned int rdev;
    unsigned int blocks;
    unsigned int fsid;
    unsigned int fileid;
    timeval      atime;
    timeval      mtime;
    timeval      ctime;
};
]]></sourcecode>
        </section>
        <section anchor="defined-error-numbers">
          <name>Defined Error Numbers</name>
          <t><xref section="2.3.1" sectionFormat="of" target="RFC1094"/> describes an enumerated type called
"stat" which provides a status code for NFS version 2 results.
A matching type called "aclstat2" is defined in this document
for the similar purpose of returning NFS_ACL version 2 procedure
status codes. The numeric values of these two types match up,
though aclstat2 omits some codes that are not relevant to the
NFS_ACL protocol.</t>
          <sourcecode type="xdr"><![CDATA[
enum aclstat2 {
    ACL2_OK = 0,
    ACL2ERR_PERM = 1,
    ACL2ERR_IO = 5,
    ACL2ERR_ACCES = 13,
    ACL2ERR_NOSPC = 28,
    ACL2ERR_ROFS = 30,
    ACL2ERR_DQUOT = 69,
    ACL2ERR_STALE = 70
};
]]></sourcecode>
          <t>These status codes carry the following meanings:</t>
          <dl>
            <dt>ACL2ERR_PERM</dt>
            <dd>
              <t>Not owner. The caller does not have correct ownership to perform the requested operation.</t>
            </dd>
            <dt>ACL2ERR_IO</dt>
            <dd>
              <t>Some sort of hard error occurred when the operation was in progress.  This could be a disk error, for example.</t>
            </dd>
            <dt>ACL2ERR_ACCES</dt>
            <dd>
              <t>Permission denied.  The caller does not have the correct permission to perform the requested operation.</t>
            </dd>
            <dt>ACL2ERR_NOSPC</dt>
            <dd>
              <t>No space left on device.  The operation caused the server's file system to reach its limit.</t>
            </dd>
            <dt>ACL2ERR_ROFS</dt>
            <dd>
              <t>Read-only file system.  Write attempted on a read-only file system.</t>
            </dd>
            <dt>ACL2ERR_DQUOT</dt>
            <dd>
              <t>Disk quota exceeded.  The client's disk quota on the server has been exceeded.</t>
            </dd>
            <dt>ACL2ERR_STALE</dt>
            <dd>
              <t>The "fhandle" given in the arguments was invalid.  That is, the file referred to by that file handle no longer exists, or access to it has been revoked.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="server-procedures">
        <name>Server Procedures</name>
        <section anchor="procedure-0-null-no-operation">
          <name>Procedure 0: NULL - No Operation</name>
          <section anchor="arguments">
            <name>ARGUMENTS</name>
            <sourcecode type="xdr"><![CDATA[
void;
]]></sourcecode>
          </section>
          <section anchor="results">
            <name>RESULTS</name>
            <sourcecode type="xdr"><![CDATA[
void;
]]></sourcecode>
          </section>
          <section anchor="description">
            <name>DESCRIPTION</name>
            <t>This is the usual NULL procedure with a void argument and void result.</t>
          </section>
          <section anchor="implementation">
            <name>IMPLEMENTATION</name>
            <t>It is important that this procedure do no work at all so that clients
can use it to measure the overhead of processing a service request.
By convention, the NULL procedure should never require any
authentication.
A server implementation may choose to ignore this convention, if
responding to the NULL procedure call acknowledges the existence
of a resource to an unauthenticated client.</t>
          </section>
          <section anchor="errors">
            <name>ERRORS</name>
            <t>Since the NULL procedure returns no result, it can not return an
NFS_ACL error status code. However, some server implementations may
return RPC-level errors based on security or authentication policy
settings.</t>
          </section>
        </section>
        <section anchor="procedure-1-getacl-retrieve-an-access-control-list">
          <name>Procedure 1: GETACL - Retrieve an Access Control List</name>
          <section anchor="arguments-1">
            <name>ARGUMENTS</name>
            <sourcecode type="xdr"><![CDATA[
struct GETACL2args {
    fhandle fh;
    unsigned int mask;
};
]]></sourcecode>
          </section>
          <section anchor="results-1">
            <name>RESULTS</name>
            <sourcecode type="xdr"><![CDATA[
struct GETACL2resok {
    struct nfsfattr attr;
    secattr acl;
};

union GETACL2res switch (enum nfsstat status) {
case ACL2_OK:
    GETACL2resok resok;
default:
    void;
};
]]></sourcecode>
          </section>
          <section anchor="description-1">
            <name>DESCRIPTION</name>
            <t>The GETACL procedure retrieves Access Control List
information associated with the file system object
specified by the GETACL2args.fh field. The client
obtains this file handle using one of the NFS
version 2 LOOKUP, CREATE, MKDIR, or SYMLINK procedures,
or the MOUNT service, as described in <xref target="RFC1094"/>.</t>
            <t>The GETACL2args.mask field specifies which information
is to be returned in the response:</t>
            <ul spacing="normal">
              <li>
                <t>If the NA_ACL bit is set, the server fills in the
object's access ACL.</t>
              </li>
              <li>
                <t>If the NA_ACLCNT bit is set, the server fills in
the number of ACEs that are in the object's access ACL.</t>
              </li>
              <li>
                <t>If the NA_DFACL bit is set, the server fills in
the object's default ACL.</t>
              </li>
              <li>
                <t>if the NA_DFACLCNT bit is set, the server fills in
the number of ACEs that are in the object's default ACL.</t>
              </li>
            </ul>
            <t>If the GETACL procedure is successful, the server sets the
GETACL2res.status field to ACL2_OK. It fills in the
GETACL2resok.attr field with the file object's current
file attributes, as detailed in <xref target="RFC1094"/>. Lastly,
it fills in the GETACL2res.acl field with two counted
arrays of Access Control Entries (ACEs).</t>
            <t>Otherwise, GETACL2res.status contains an error status
on failure and no other results are returned.</t>
          </section>
          <section anchor="implementation-1">
            <name>IMPLEMENTATION</name>
            <t>When GETACL2args.fh represents a file object that does not currently
have an ACL associated with it or does not implement support
for ACLs, the server responds by returning a manufactured
minimal NFS ACL that reflects the current owner, group, and
mode bits of the object (see <xref target="acls-in-operation"/>).</t>
          </section>
          <section anchor="errors-1">
            <name>ERRORS</name>
            <ul spacing="normal">
              <li>
                <t>ACL2ERR_IO</t>
              </li>
              <li>
                <t>ACL2ERR_STALE</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="procedure-2-setacl-set-or-replace-an-access-control-list">
          <name>Procedure 2: SETACL - Set or replace an Access Control List</name>
          <section anchor="arguments-2">
            <name>ARGUMENTS</name>
            <sourcecode type="xdr"><![CDATA[
struct SETACL2args {
    fhandle fh;
    secattr acl;
};
]]></sourcecode>
          </section>
          <section anchor="results-2">
            <name>RESULTS</name>
            <sourcecode type="xdr"><![CDATA[
struct SETACL2resok {
    struct nfsfattr attr;
};

union SETACL2res switch (enum nfsstat status) {
case ACL2_OK:
    SETACL2resok resok;
default:
    void;
};
]]></sourcecode>
          </section>
          <section anchor="description-2">
            <name>DESCRIPTION</name>
            <t>The SETACL procedure replaces the Access Control Lists
associated with the file system object specified by the
SETACL2args.fh field with the ACLs specified by the
SETACL2args.acl field.  The client obtains the file
handle using one of the NFS version 2 LOOKUP, CREATE,
MKDIR, SYMLINK procedures, or the MOUNT service, as
described in <xref target="RFC1094"/>.</t>
            <aside>
              <t>How are ACLs removed?</t>
            </aside>
            <t>If the SETACL procedure is successful, the server sets the
SETACL2res.status field to ACL2_OK and fills in the
SETACL2resok.attr field with the file object's new
file attributes, as detailed in <xref target="RFC1094"/>.</t>
            <t>Otherwise, SETACL2res.status contains an error status
on failure and no other results are returned.</t>
          </section>
          <section anchor="implementation-2">
            <name>IMPLEMENTATION</name>
            <t>On success, the server does not send the reply until
the ACL change is durable locally.</t>
            <t>Changing a file object's ACL changes the object's mtime.
The mtime change is reflected in the attributes returned
in the SETACL response.</t>
            <t>A high-quality server implementation ensures that a
GETACL procedure running concurrently with a SETACL
procedure does not return partially updated (torn)
ACL contents. However, a failed SETACL may partially
change a file's ACLs.</t>
            <t>When SETACL2args.fh represents a file object that does
not implement support for ACLs, or the new ACL does not
contain at least the minimal set of ACEs (as described
in <xref target="acls-in-operation"/>), the server responds by
setting SETACL2res.status to ACL2ERR_IO.</t>
          </section>
          <section anchor="errors-2">
            <name>ERRORS</name>
            <ul spacing="normal">
              <li>
                <t>ACL2ERR_ROFS</t>
              </li>
              <li>
                <t>ACL2ERR_PERM</t>
              </li>
              <li>
                <t>ACL2ERR_IO</t>
              </li>
              <li>
                <t>ACL2ERR_ACCES</t>
              </li>
              <li>
                <t>ACL2ERR_NOSPC</t>
              </li>
              <li>
                <t>ACL2ERR_DQUOT</t>
              </li>
              <li>
                <t>ACL2ERR_STALE</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="procedure-3-getattr-get-file-attributes">
          <name>Procedure 3: GETATTR - Get file attributes</name>
          <section anchor="arguments-3">
            <name>ARGUMENTS</name>
            <sourcecode type="xdr"><![CDATA[
struct GETATTR2args {
    fhandle fh;
};
]]></sourcecode>
          </section>
          <section anchor="results-3">
            <name>RESULTS</name>
            <sourcecode type="xdr"><![CDATA[
struct GETATTR2resok {
    struct nfsfattr attr;
};

union GETATTR2res switch (enum nfsstat status) {
case ACL2_OK:
    GETATTR2resok resok;
default:
    void;
};
]]></sourcecode>
          </section>
          <section anchor="description-3">
            <name>DESCRIPTION</name>
            <t>The GETATTR procedure retrieves the current file
attributes associated with the file system object
specified by the GETATTR2args.fh field. The client
obtains this file handle using one of the NFS
version 2 LOOKUP, CREATE, MKDIR, SYMLINK procedures,
or the MOUNT service, as described in <xref target="RFC1094"/>.</t>
            <t>If the GETATTR procedure is successful, the server
sets the GETATTR2res.status field to ACL2_OK, and
fills in the GETATTR2resok.attr field with the file
object's current file attributes, as detailed in
<xref target="RFC1094"/>.</t>
            <t>Otherwise, GETATTR2res.status contains an error
status on failure and no other results are returned.</t>
          </section>
          <section anchor="implementation-3">
            <name>IMPLEMENTATION</name>
            <t>Refer to <xref section="2.3.5" sectionFormat="of" target="RFC1094"/> for details
about the content of the returned file attributes.</t>
          </section>
          <section anchor="errors-3">
            <name>ERRORS</name>
            <ul spacing="normal">
              <li>
                <t>ACL2ERR_IO</t>
              </li>
              <li>
                <t>ACL2ERR_STALE</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="procedure-4-access-check-access-permission">
          <name>Procedure 4: ACCESS - Check access permission</name>
          <section anchor="arguments-4">
            <name>ARGUMENTS</name>
            <sourcecode type="xdr"><![CDATA[
struct ACCESS2args {
    fhandle fh;
    uint32 access;
};
]]></sourcecode>
          </section>
          <section anchor="results-4">
            <name>RESULTS</name>
            <sourcecode type="xdr"><![CDATA[
const ACCESS2_READ = 0x1;       /* read data or readdir a directory */
const ACCESS2_LOOKUP = 0x2;     /* lookup a name in a directory */
const ACCESS2_MODIFY = 0x4;     /* rewrite existing file data or */
                                /* modify existing directory entries */
const ACCESS2_EXTEND = 0x8;     /* write new data or add directory entries */
const ACCESS2_DELETE = 0x10;    /* delete existing directory entry */
const ACCESS2_EXECUTE = 0x20;   /* execute file (no meaning for a directory) */

struct ACCESS2resok {
    struct nfsfattr attr;
    uint32 access;
};

union ACCESS2res switch (enum nfsstat status) {
case ACL2_OK:
    ACCESS2resok resok;
default:
    void;
};
]]></sourcecode>
          </section>
          <section anchor="description-4">
            <name>DESCRIPTION</name>
            <t>The ACCESS procedure determines the access rights
that a user, as identified by the RPC credentials
in the request, has with respect to the file handle
specified by the ACCESS2args.fh field. The client
obtains this file handle using one of the NFS
version 2 LOOKUP, CREATE, MKDIR, SYMLINK procedures,
or the MOUNT service, as described in <xref target="RFC1094"/>.
The client encodes the set of permissions that are
to be checked in the ACCESS2args.access field.</t>
            <t>The following access permissions may be requested:</t>
            <dl>
              <dt>ACCESS2_READ</dt>
              <dd>
                <t>Read data from file or read a directory.</t>
              </dd>
              <dt>ACCESS2_LOOKUP</dt>
              <dd>
                <t>Look up a name in a directory (no meaning for non-directory objects).</t>
              </dd>
              <dt>ACCESS2_MODIFY</dt>
              <dd>
                <t>Rewrite existing file data or modify existing directory entries.</t>
              </dd>
              <dt>ACCESS2_EXTEND</dt>
              <dd>
                <t>Write new data or add directory entries.</t>
              </dd>
              <dt>ACCESS2_DELETE</dt>
              <dd>
                <t>Delete an existing directory entry (no meaning for non-directory objects).</t>
              </dd>
              <dt>ACCESS2_EXECUTE</dt>
              <dd>
                <t>Execute file (no meaning for a directory).</t>
              </dd>
            </dl>
            <t>If the ACCESS procedure is successful, the server
sets the ACCESS2res.status field to ACL2_OK. It
fills in the ACCESS2resok.attr field with the file
object's current file attributes, as detailed in
<xref target="RFC1094"/>. Lastly, it encodes the set of
permissions that the requesting user is granted
in the ACCESS2resok.access field.</t>
          </section>
          <section anchor="implementation-4">
            <name>IMPLEMENTATION</name>
            <t>In the NFS version 2 protocol, the only reliable way to
determine whether an operation is allowed is to try it
and see if it succeeded or failed. Using the ACCESS
procedure in the NFS_ACL version 2 protocol, a client can
ask the server to indicate whether or not one or more
classes of operations are permitted.</t>
            <t>In general, it is not sufficient for a client to attempt
to deduce access permissions by inspecting the uid, gid,
and mode fields in the file attributes, since the server
may perform uid or gid mapping or enforce additional
access control restrictions. It is also possible that the
NFS version 2 protocol server may not be in the same ID
space as the NFS version 2 protocol client. In these cases,
the NFS version 2 protocol client can not reliably perform
an access check with only current file attributes.</t>
            <t>The information returned by the server in response to an
ACCESS call is advisory only. It was correct at the exact
time that the server performed the checks, but not
necessarily afterwards. The server can revoke access
permission to a file object at any time.</t>
            <t>The NFS_ACL version 2 protocol client should use the
effective credentials of the user to build the
authentication information in the ACCESS request used
to determine access rights. It is the effective user
and group credentials that are used in subsequent read
and write operations.</t>
            <t>Many implementations do not directly support the
ACCESS2_DELETE permission. Operating systems like UNIX
may ignore the ACCESS2_DELETE bit if set on an access
request on a non-directory object. In these systems,
delete permission on a file is determined by the access
permissions on the directory in which the file resides,
instead of being determined by the permissions of the file
itself.  Thus, the bit mask returned for such a request
will have the ACCESS3_DELETE bit set to 0, indicating that
the client does not have this permission.</t>
            <t>The server should return a status of ACL2_OK if no
errors occurred that prevented the server from making
the required access checks.</t>
          </section>
          <section anchor="errors-4">
            <name>ERRORS</name>
            <ul spacing="normal">
              <li>
                <t>ACL2ERR_IO</t>
              </li>
              <li>
                <t>ACL2ERR_STALE</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="procedure-5-getxattrdir-get-named-attribute-directory">
          <name>Procedure 5: GETXATTRDIR - Get named attribute directory</name>
          <section anchor="arguments-5">
            <name>ARGUMENTS</name>
            <sourcecode type="xdr"><![CDATA[
struct GETXATTRDIR2args {
    fhandle fh;
    bool create;
};
]]></sourcecode>
          </section>
          <section anchor="results-5">
            <name>RESULTS</name>
            <sourcecode type="xdr"><![CDATA[
struct GETXATTRDIR2resok {
    fhandle fh;
    struct nfsfattr attr;
};

union GETXATTRDIR2res switch (enum nfsstat status) {
case ACL2_OK:
    GETXATTRDIR2resok resok;
default:
    void;
};
]]></sourcecode>
          </section>
          <section anchor="description-5">
            <name>DESCRIPTION</name>
            <t><xref section="5.3" sectionFormat="of" target="RFC8881"/> defines a set of generic file attributes known
as "named attributes". The GETXATTRDIR procedure extends this facility
into the NFSv2 protocol.</t>
            <t>The GETXATTRDIR procedure obtains the file handle of the named attribute
directory associated with the file handle in the GETXATTRDIR2args.fh
field. This directory contains only objects of type NFREG.</t>
            <t>If the GETXATTRDIR procedure is successful, the server sets the
GETXATTRDIR2res.status field to ACL2_OK.
It fills in the GETXATTRDIR2resok.fh field with a file handle that
the client may use to look up the target file's named attributes.
It fills in the GETXATTRDIR2resok.attr field with the name attribute
directory's current file attributes, as detailed in <xref target="RFC1094"/>.</t>
            <t>Using the file handle returned in GETXATTRDIR2resok.fh, a client
can utilize the READDIR and LOOKUP procedures to obtain file handles
for the named attributes associated with the target file system object.</t>
            <t>If the target file object does not currently have a named attribute
directory associated with it and the GETXATTRDIR2args.create boolean
field is set to false, the server returns ACL2ERR_NOENT.
If the target file object does not currently have a named attribute
directory associated with it and the GETXATTRDIR2args.create boolean
field is set to true, the server attempts to create the named attribute
directory before returning a result.
If the target file currently has a named attribute directory
associated with it and the GETXATTRDIR2args.create boolean is set
to true, the server returns the file handle of that named attribute
directory.</t>
            <t>If the RPC user does not have read access to the target file, or
if the GETXATTRDIR operation is to create a named attribute directory
and the RPC user does not have permission to do so, the server returns
ACL2_ACCES in the GETXATTRDIR2.status field.</t>
            <t>If the target file handle designates an object not of type NFREG or
NFDIR, the server returns the value ACL2ERR_IO in the GETXATTRDIR2.status
field. Neither named attributes nor named attribute directories have
their own named attributes.</t>
            <t>Note: This operation is equivalent to the NFSv4 OPENATTR operation as
specified in <xref section="16.17" sectionFormat="of" target="RFC7530"/> and <xref section="18.17" sectionFormat="of" target="RFC8881"/>.</t>
          </section>
          <section anchor="implementation-5">
            <name>IMPLEMENTATION</name>
            <t>Server implementers are free to choose not to implement this procedure.
In this case, the server returns the RPC-level error PROC_UNAVAIL.</t>
            <t>If the server implementation does implement the GETXATTRDIR procedure
but the shared file system containing the file object specified by the
file handle in the GETXATTRDIR2args.fh field does not support named
attributes, the server returns ACL2ERR_IO in the GETXATTRDIR2.status
field.</t>
          </section>
          <section anchor="errors-5">
            <name>ERRORS</name>
            <ul spacing="normal">
              <li>
                <t>ACL2ERR_PERM</t>
              </li>
              <li>
                <t>ACL2ERR_NOENT</t>
              </li>
              <li>
                <t>ACL2ERR_IO</t>
              </li>
              <li>
                <t>ACL2ERR_ACCES</t>
              </li>
              <li>
                <t>ACL2ERR_NOSPC</t>
              </li>
              <li>
                <t>ACL2ERR_ROFS</t>
              </li>
              <li>
                <t>ACL2ERR_STALE</t>
              </li>
            </ul>
          </section>
        </section>
      </section>
    </section>
    <section anchor="nfsacl-version-3">
      <name>NFS_ACL Version 3</name>
      <t>Version 3 of the NFS_ACL protocol is used in conjunction only with
version 3 of the NFS protocol.</t>
      <section anchor="data-types-inherited-from-nfs-version-3">
        <name>Data types inherited from NFS version 3</name>
        <section anchor="scalar-data-types">
          <name>Scalar Data types</name>
          <t>These are defined in <xref section="2.5" sectionFormat="of" target="RFC1813"/>.</t>
          <sourcecode type="xdr"><![CDATA[
typedef unsigned hyper uint64;
]]></sourcecode>
          <sourcecode type="xdr"><![CDATA[
typedef unsigned long uint32;
]]></sourcecode>
          <sourcecode type="xdr"><![CDATA[
typedef uint64 fileid3;
]]></sourcecode>
          <sourcecode type="xdr"><![CDATA[
typedef uint32 uid3;
]]></sourcecode>
          <sourcecode type="xdr"><![CDATA[
typedef uint32 gid3;
]]></sourcecode>
          <sourcecode type="xdr"><![CDATA[
typedef uint64 size3;
]]></sourcecode>
          <sourcecode type="xdr"><![CDATA[
typedef uint32 mode3;
]]></sourcecode>
        </section>
        <section anchor="ftype3">
          <name>ftype3</name>
          <t>The enumeration "ftype3" represents the type of a file object.
This definition is further explained in <xref section="2.6" sectionFormat="of" target="RFC1813"/>.</t>
          <sourcecode type="xdr"><![CDATA[
enum ftype3 {
    NF3REG    = 1,
    NF3DIR    = 2,
    NF3BLK    = 3,
    NF3CHR    = 4,
    NF3LNK    = 5,
    NF3SOCK   = 6,
    NF3FIFO   = 7
};
]]></sourcecode>
        </section>
        <section anchor="specdata3">
          <name>specdata3</name>
          <sourcecode type="xdr"><![CDATA[
struct specdata3 {
    uint32     specdata1;
    uint32     specdata2;
};
]]></sourcecode>
          <t>The interpretation of the two words depends on the type of file
system object. For a block special (NF3BLK) or character special
(NF3CHR) file, specdata1 and specdata2 are the major and minor
device numbers, respectively. For all other file types, these
two elements should either be set to 0 or the values should be
agreed upon by the client and server.</t>
          <t>Further detail is available in <xref section="2.6" sectionFormat="of" target="RFC1813"/>.</t>
        </section>
        <section anchor="nfsfh3">
          <name>nfs_fh3</name>
          <t>The nfs_fh3 data type is a variable-length opaque object returned
by the NFS version 3 LOOKUP, CREATE, SYMLINK, MKNOD, LINK,
or READDIRPLUS procedures.
A client uses this handle during subsequent NFS operations
to reference the file. This definition comes from
<xref section="2.6" sectionFormat="of" target="RFC1813"/>.</t>
          <sourcecode type="xdr"><![CDATA[
NFS3_FHSIZE 64
]]></sourcecode>
          <t>The maximum size in bytes of the opaque file handle.</t>
          <sourcecode type="xdr"><![CDATA[
struct nfs_fh3 {
    opaque       data<NFS3_FHSIZE>;
};
]]></sourcecode>
          <t>To the client, a file handle is opaque. The client stores file
handles for use in a later request and can compare two file
handles from the same server for equality by doing a
byte-by-byte comparison, but cannot otherwise interpret the
contents of file handles. Further, if two file handles from the
same server are equal, they must refer to the same file, but if
they are not equal, no conclusions can be drawn.</t>
          <t>Servers may revoke access provided by a file handle at any
time. If the file handle passed in a call refers to a file
system object that no longer exists on the server or access for
that file handle has been revoked, the error, ACL3ERR_STALE,
is returned.</t>
        </section>
        <section anchor="nfstime3">
          <name>nfstime3</name>
          <t>NFS version 3's "nfstime3" structure represents the number of
seconds and nanoseconds since midnight January 1, 1970 Greenwich
Mean Time. Further details are in <xref section="2.6" sectionFormat="of" target="RFC1813"/>.</t>
          <sourcecode type="xdr"><![CDATA[
struct nfstime3 {
    uint32   seconds;
    uint32   nseconds;
};
]]></sourcecode>
        </section>
        <section anchor="nfsfattr3">
          <name>nfsfattr3</name>
          <t>This document refers to NFS version 3's file attribute structure
as "nfsfattr3". This is the same as the fattr3 structure described
in <xref section="2.6" sectionFormat="of" target="RFC1813"/>. A definition of the bit fields in
the "mode" element, which relate to traditional file system access
permissions, can also be found there.</t>
          <sourcecode type="xdr"><![CDATA[
struct fattr3 {
    ftype3     type;
    mode3      mode;
    uint32     nlink;
    uid3       uid;
    gid3       gid;
    size3      size;
    size3      used;
    specdata3  rdev;
    uint64     fsid;
    fileid3    fileid;
    nfstime3   atime;
    nfstime3   mtime;
    nfstime3   ctime;
};
]]></sourcecode>
        </section>
        <section anchor="postopattr">
          <name>post_op_attr</name>
          <t>The NFS version 3 "post_op_attr" data type returns file
attributes that are not directly involved in the requested
procedure. See <xref section="2.6" sectionFormat="of" target="RFC1813"/> for more
information.</t>
          <sourcecode type="xdr"><![CDATA[
union post_op_attr switch (bool attributes_follow) {
case TRUE:
    fattr3   attributes;
case FALSE:
    void;
};
]]></sourcecode>
          <t>The format of this data type appears to make returning file
attributes optional. However, server implementers are strongly
encouraged to make a best effort to return attributes whenever
possible, even when returning an error.</t>
        </section>
      </section>
      <section anchor="error-values">
        <name>Error Values</name>
        <t><xref section="2.5" sectionFormat="of" target="RFC1813"/> describes an enumerated type called
"nfsstat3" which provides a status code for NFS version 3 procedure
results.
A matching type called "aclstat3" is defined in this document
for the similar purpose of returning NFS_ACL version 3 procedure
status codes. The numeric values of these two types match up,
although aclstat3 omits some codes that are not relevant to the
NFS_ACL protocol.</t>
        <sourcecode type="xdr"><![CDATA[
enum aclstat3 {
    ACL3_OK             = 0,
    ACL3ERR_PERM        = 1,
    ACL3ERR_IO          = 5,
    ACL3ERR_ACCES       = 13,
    ACL3ERR_INVAL       = 22,
    ACL3ERR_NOSPC       = 28,
    ACL3ERR_ROFS        = 30,
    ACL3ERR_DQUOT       = 69,
    ACL3ERR_STALE       = 70,
    ACL3ERR_BADHANDLE   = 10001,
    ACL3ERR_NOTSUPP     = 10004,
    ACL3ERR_SERVERFAULT = 10006,
    ACL3ERR_JUKEBOX     = 10008
};
]]></sourcecode>
        <t>These status codes carry the following meanings:</t>
        <dl>
          <dt>ACL3_OK</dt>
          <dd>
            <t>Indicates the call completed successfully.</t>
          </dd>
          <dt>ACL3ERR_PERM</dt>
          <dd>
            <t>Not owner. The operation was not allowed because the caller is either not a privileged user (root) or not the owner of the target of the operation.</t>
          </dd>
          <dt>ACL3ERR_IO</dt>
          <dd>
            <t>I/O error. A hard error (for example, a disk error) occurred while processing the requested operation.</t>
          </dd>
          <dt>ACL3ERR_ACCES</dt>
          <dd>
            <t>Permission denied. The caller does not have the correct permission to perform the requested operation. Contrast this with NFS3ERR_PERM, which restricts itself to owner or privileged user permission failures.</t>
          </dd>
          <dt>ACL3ERR_INVAL</dt>
          <dd>
            <t>An invalid or unsupported argument was specified for procedure.</t>
          </dd>
          <dt>ACL3ERR_NOSPC</dt>
          <dd>
            <t>No space left on device. The operation would have caused the server's file system to exceed its limit.</t>
          </dd>
          <dt>ACL3ERR_ROFS</dt>
          <dd>
            <t>Read-only file system. A modifying operation was attempted on a read-only file system.</t>
          </dd>
          <dt>ACL3ERR_DQUOT</dt>
          <dd>
            <t>Resource (quota) hard limit exceeded. The user's resource limit on the server has been exceeded.</t>
          </dd>
          <dt>ACL3ERR_STALE</dt>
          <dd>
            <t>Invalid file handle. The file handle given in the arguments was invalid. The file referred to by that file handle no longer exists or access to it has been revoked.</t>
          </dd>
          <dt>ACL3ERR_BADHANDLE</dt>
          <dd>
            <t>Illegal NFS file handle. The file handle failed internal consistency checks.</t>
          </dd>
          <dt>ACL3ERR_NOTSUPP</dt>
          <dd>
            <t>Operation is not supported.</t>
          </dd>
          <dt>ACL3ERR_SERVERFAULT</dt>
          <dd>
            <t>An error occurred on the server which does not map to any of the legal NFS version 3 protocol error values.  The client should translate this into an appropriate error. UNIX clients may choose to translate this to EIO.</t>
          </dd>
          <dt>ACL3ERR_JUKEBOX</dt>
          <dd>
            <t>The server initiated the request, but was not able to complete it in a timely fashion. The client should wait and then try the request with a new RPC transaction ID. For example, this error should be returned from a server that supports hierarchical storage and receives a request to process a file that has been migrated. In this case, the server should start the immigration process and respond to client with this error.</t>
          </dd>
        </dl>
      </section>
      <section anchor="server-procedures-1">
        <name>Server Procedures</name>
        <section anchor="procedure-0-null-no-operation-1">
          <name>Procedure 0: NULL - No Operation</name>
          <section anchor="arguments-6">
            <name>ARGUMENTS</name>
            <sourcecode type="xdr"><![CDATA[
void;
]]></sourcecode>
          </section>
          <section anchor="results-6">
            <name>RESULTS</name>
            <sourcecode type="xdr"><![CDATA[
void;
]]></sourcecode>
          </section>
          <section anchor="description-6">
            <name>DESCRIPTION</name>
            <t>This is the usual NULL procedure with a void argument and void result.</t>
          </section>
          <section anchor="implementation-6">
            <name>IMPLEMENTATION</name>
            <t>It is important that this procedure do no work at all so that clients
can use it to measure the overhead of processing a service request.
By convention, the NULL procedure should never require any
authentication.
A server implmentation may choose to ignore this convention, if
responding to the NULL procedure call acknowledges the existence
of a resource to an unauthenticated client.</t>
          </section>
          <section anchor="errors-6">
            <name>ERRORS</name>
            <t>Since the NULL procedure takes no argument and returns no
result, it can not return an NFS or NFS_ACL error status code.
However, some server implementations may return RPC errors
based on security or authentication policy settings.</t>
          </section>
        </section>
        <section anchor="procedure-1-getacl-retrieve-an-access-control-list-1">
          <name>Procedure 1: GETACL - Retrieve an Access Control List</name>
          <section anchor="arguments-7">
            <name>ARGUMENTS</name>
            <sourcecode type="xdr"><![CDATA[
struct GETACL3args {
    nfs_fh3 fh;
    unsigned int mask;
};
]]></sourcecode>
          </section>
          <section anchor="results-7">
            <name>RESULTS</name>
            <sourcecode type="xde"><![CDATA[
struct GETACL3resok {
    post_op_attr attr;
    secattr acl;
};

struct GETACL3resfail {
    post_op_attr attr;
};

union GETACL3res switch (aclstat3 status) {
case ACL3_OK:
    GETACL3resok resok;
default:
    GETACL3resfail resfail;
};
]]></sourcecode>
          </section>
          <section anchor="description-7">
            <name>DESCRIPTION</name>
            <t>The GETACL procedure retrieves Access Control List
information associated with the file system object
specified by the GETACL3args.fh field. The client
obtains this file handle using one of the NFS
version 2 LOOKUP, CREATE, MKDIR, SYMLINK, MKNOD,
or READDIRPLUS procedures, or the MOUNT service,
as described in <xref target="RFC1813"/>.</t>
            <t>The GETACL3args.mask field specifies which information
is to be returned in the response:</t>
            <ul spacing="normal">
              <li>
                <t>If the NA_ACL bit is set, the server fills in the
object's access ACL.</t>
              </li>
              <li>
                <t>If the NA_ACLCNT bit is set, the server fills in
the number of ACEs that are in the object's access ACL.</t>
              </li>
              <li>
                <t>If the NA_DFACL bit is set, the server fills in
the object's default ACL.</t>
              </li>
              <li>
                <t>if the NA_DFACLCNT bit is set, the server fills in
the number of ACEs that are in the object's default ACL.</t>
              </li>
            </ul>
            <t>If the GETACL procedure is successful, the server sets the
GETACL3res.status field to ACL3_OK. It fills in the
GETACL3resok.attr field with the file object's post
operation file attributes, as detailed in <xref target="RFC1813"/>.
Lastly, it fills in the GETACL3res.acl field with two
counted arrays of Access Control Entries (ACEs).</t>
            <t>Otherwise, GETACL3res.status contains an error status
on failure and no other results are returned.</t>
          </section>
          <section anchor="implementation-7">
            <name>IMPLEMENTATION</name>
            <t>When GETACL3args.fh represents a file object that does
not currently have an ACL associated with it or does not
implement support for ACLs, the server responds by
returning a manufactured minimal NFS ACL that reflects
the current owner, group, and mode bits of the object
(see <xref target="acls-in-operation"/>).</t>
          </section>
          <section anchor="errors-7">
            <name>ERRORS</name>
            <ul spacing="normal">
              <li>
                <t>ACL3ERR_IO</t>
              </li>
              <li>
                <t>ACL3ERR_STALE</t>
              </li>
              <li>
                <t>ACL3ERR_BADHANDLE</t>
              </li>
              <li>
                <t>ACL3ERR_SERVERFAULT</t>
              </li>
              <li>
                <t>ACL3ERR_JUKEBOX</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="setacl-procedure">
          <name>SETACL Procedure</name>
          <section anchor="arguments-8">
            <name>ARGUMENTS</name>
            <sourcecode type="xdr"><![CDATA[
struct SETACL3args {
    nfs_fh3 fh;
    secattr acl;
};
]]></sourcecode>
          </section>
          <section anchor="results-8">
            <name>RESULTS</name>
            <sourcecode type="xdr"><![CDATA[
struct SETACL3resok {
    post_op_attr attr;
};

struct SETACL3resfail {
    post_op_attr attr;
};

union SETACL3res switch (aclstat3 status) {
case ACL3_OK:
    SETACL3resok resok;
default:
    SETACL3resfail resfail;
};
]]></sourcecode>
          </section>
          <section anchor="description-8">
            <name>DESCRIPTION</name>
            <t>The SETACL procedure replaces the Access Control Lists
associated with the file system object specified by the
SETACL3args.fh field with the ACLs specified by the
SETACL3args.acl field.  The client obtains the file
handle using one of the NFS version 3 LOOKUP, CREATE,
MKDIR, MKNOD, SYMLINK, or READDIRPLUS procedures, or
the MOUNT service, as described in <xref target="RFC1813"/>.</t>
            <aside>
              <t>How are ACLs removed?</t>
            </aside>
            <t>If the SETACL procedure is successful, the server sets
the SETACL3res.status field to ACL3_OK and fills in the
SETACL3resok.attr field with the file object's post
operation file attributes, as detailed in <xref target="RFC1813"/>.</t>
            <t>Otherwise, SETACL3res.status contains an error status
on failure and no other results are returned.</t>
          </section>
          <section anchor="implementation-8">
            <name>IMPLEMENTATION</name>
            <t>On success, the server does not send the reply until
the ACL change is durable locally.</t>
            <t>Changing a file object's ACL changes the object's mtime.
The mtime change is reflected in the attributes returned
in the SETACL response.</t>
            <t>A high-quality server implementation ensures that a
GETACL procedure running concurrently with a SETACL
procedure does not return partially updated (torn)
ACL contents. However, a failed SETACL may partially
change a file's ACLs.</t>
            <t>When SETACL3args.fh represents a file object that does
not implement support for ACLs, the server responds
by setting SETACL3res.status to ACL3ERR_NOTSUPP.</t>
            <t>When SETACL3args.acl does not contain at least the
minimal set of ACEs (as described in
<xref target="acls-in-operation"/>), the server responds by setting
SETACL3res.status to ACL3ERR_INVAL.</t>
          </section>
          <section anchor="errors-8">
            <name>ERRORS</name>
            <ul spacing="normal">
              <li>
                <t>ACL3ERR_PERM</t>
              </li>
              <li>
                <t>ACL3ERR_IO</t>
              </li>
              <li>
                <t>ACL3ERR_ACCES</t>
              </li>
              <li>
                <t>ACL3ERR_INVAL</t>
              </li>
              <li>
                <t>ACL3ERR_NOSPC</t>
              </li>
              <li>
                <t>ACL3ERR_ROFS</t>
              </li>
              <li>
                <t>ACL3ERR_DQUOT</t>
              </li>
              <li>
                <t>ACL3ERR_STALE</t>
              </li>
              <li>
                <t>ACL3ERR_BADHANDLE</t>
              </li>
              <li>
                <t>ACL3ERR_SERVERFAULT</t>
              </li>
              <li>
                <t>ACL3ERR_JUKEBOX</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="procedure-3-getxattrdir-get-named-attribute-directory">
          <name>Procedure 3: GETXATTRDIR - Get named attribute directory</name>
          <section anchor="arguments-9">
            <name>ARGUMENTS</name>
            <sourcecode type="xdr"><![CDATA[
struct GETXATTRDIR3args {
    nfs_fh3 fh;
    bool create;
};
]]></sourcecode>
          </section>
          <section anchor="results-9">
            <name>RESULTS</name>
            <sourcecode type="xdr"><![CDATA[
struct GETXATTRDIR3resok {
    nfs_fh3 fh;
    post_op_attr attr;
};

union GETXATTRDIR3res switch (aclstat3 status) {
case ACL3_OK:
    GETXATTRDIR3resok resok;
default:
    void;
};
]]></sourcecode>
          </section>
          <section anchor="description-9">
            <name>DESCRIPTION</name>
            <t><xref section="5.3" sectionFormat="of" target="RFC8881"/> defines a set of generic file attributes known
as "named attributes". The GETXATTRDIR procedure extends this facility
into the NFSv3 protocol.</t>
            <t>The GETXATTRDIR procedure obtains the file handle of the named attribute
directory associated with the file handle in the GETXATTRDIR3args.fh
field. This directory contains only objects of type NF3REG.</t>
            <t>If the GETXATTRDIR procedure is successful, the server sets the
GETXATTRDIR3res.status field to ACL3_OK.
It fills in the GETXATTRDIR3resok.fh field with a file handle that
the client may use to look up the target file's named attributes.
It fills in the GETXATTRDIR3resok.attr field with the name attribute
directory's current file attributes, as detailed in <xref target="RFC1813"/>.</t>
            <t>Using the file handle returned in GETXATTRDIR3resok.fh, a client
can utilize the READDIR and LOOKUP procedures to obtain file handles
for the named attributes associated with the target file system object.</t>
            <t>If the target file object does not currently have a named attribute
directory associated with it and the GETXATTRDIR3args.create boolean
field is set to false, the server returns ACL3ERR_NOENT.
If the target file object does not currently have a named attribute
directory associated with it and the GETXATTRDIR3args.create boolean
field is set to true, the server attempts to create the named attribute
directory before returning a result.
If the target file currently has a named attribute directory
associated with it and the GETXATTRDIR3args.create boolean is set
to true, the server returns the file handle of that named attribute
directory.</t>
            <t>If the RPC user does not have read access to the target file, or
if the GETXATTRDIR operation is to create a named attribute directory
and the RPC user does not have permission to do so, the server returns
ACL3_ACCES in the GETXATTRDIR3.status field.</t>
            <t>If the target file handle designates an object not of type NF3REG or
NF3DIR, the server returns the value ACL3ERR_INVAL in the
GETXATTRDIR3.status field. Neither named attributes nor named attribute
directories have their own named attributes.</t>
            <t>Note: This operation is equivalent to the NFSv4 OPENATTR operation as
specified in <xref section="16.17" sectionFormat="of" target="RFC7530"/> and <xref section="18.17" sectionFormat="of" target="RFC8881"/>.</t>
          </section>
          <section anchor="implementation-9">
            <name>IMPLEMENTATION</name>
            <t>Server implementers are free to choose not to implement this procedure.
In this case, the server returns the RPC-level error PROC_UNAVAIL.</t>
            <t>If the server implementation does implement the GETXATTRDIR procedure
but the shared file system containing the file object specified by the
file handle in the GETXATTRDIR3args.fh field does not support named
attributes, the server returns ACL3ERR_NOTSUPP in the GETXATTRDIR3.status
field.</t>
          </section>
          <section anchor="errors-9">
            <name>ERRORS</name>
            <ul spacing="normal">
              <li>
                <t>ACL3ERR_PERM</t>
              </li>
              <li>
                <t>ACL3ERR_NOENT</t>
              </li>
              <li>
                <t>ACL3ERR_IO</t>
              </li>
              <li>
                <t>ACL3ERR_ACCES</t>
              </li>
              <li>
                <t>ACL3ERR_INVAL</t>
              </li>
              <li>
                <t>ACL3ERR_NOSPC</t>
              </li>
              <li>
                <t>ACL3ERR_ROFS</t>
              </li>
              <li>
                <t>ACL3ERR_STALE</t>
              </li>
              <li>
                <t>ACL3ERR_NOTSUPP</t>
              </li>
              <li>
                <t>ACL3ERR_SERVERFAULT</t>
              </li>
              <li>
                <t>ACL3ERR_JUKEBOX</t>
              </li>
            </ul>
          </section>
        </section>
      </section>
    </section>
    <section anchor="implementation-issues">
      <name>Implementation Issues</name>
      <section anchor="permission-issues">
        <name>Permission issues</name>
        <t>The NFS protocol, strictly speaking, does not
define the permission checking used by NFS servers. However, it
is expected that an NFS server will do normal operating system
permission checking using AUTH_UNIX style authentication as
the basis of its protection mechanism, or another stronger
form of authentication such as RPCSEC_GSS. With
AUTH_UNIX authentication, the server gets the client's
effective uid, effective gid, and groups on each call and
uses them to check permission. These are the so-called UNIX
credentials.</t>
        <t>Using uid and gid implies that the client and server share
the same uid list. Every server and client pair must have the
same mapping from user to uid and from group to gid. Since
every client can also be a server, this tends to imply that
the whole network shares the same uid/gid space. If this is
not the case, then it usually falls upon the server to
perform some custom mapping of credentials from one
authentication domain into another. A discussion of
techniques for managing a shared user space or for providing
mechanisms for user ID mapping is beyond the scope of this
specification.</t>
        <t>In POSIX-based operating systems, a particular user (on UNIX, the
uid 0) has access to all files, no matter what permission and
ownership they have. This superuser permission may not be
allowed on the server, since anyone who can become superuser
on their client could gain access to all remote files. A
POSIX-based NFS server by default maps uid 0 to a distinguished
value (for instance, UID_NOBODY), as well as mapping the groups
list, before doing its access checking. A server implementation
may provide a mechanism to change this mapping.</t>
      </section>
      <section anchor="duplicate-request-cache">
        <name>Duplicate Request Cache</name>
        <t>The typical NFS protocol failure recovery model
uses client time-out and retry to handle server crashes,
network partitions, and lost server replies. A retried
request is referred to as a duplicate of the original.</t>
        <t>When used in a file server context, the term idempotent can
be used to distinguish between operation types. An idempotent
request is one that a server can perform more than once with
equivalent results (though it may in fact change, as a side
effect, the access time on a file, say for READ). Some NFS
operations are obviously non-idempotent. They cannot be
reprocessed without special attention simply because they may
fail if tried a second time. A CREATE request, for example,
can be used to create a file for which the owner does not
have write permission. A duplicate of this request cannot
succeed if the original succeeded. Likewise, a file can be
removed only once.</t>
        <t>The side effects caused by performing a duplicate
non-idempotent request can be destructive. A duplicate
file truncation can result in lost writes. It is the
inherent stateless design of the NFS protocol on top
of an unreliable RPC transport that yields the
possibility of destructive replays of non-idempotent
requests. Even in an implementation of the NFS protocol
over a reliable connection-oriented transport,
a connection break with automatic reestablishment
requires duplicate request processing: the client
retransmits requests that were pending before the
connection loss, and the server needs to recognize
and deal with potential duplicate non-idempotent requests.</t>
        <t>Most NFS server implementations maintain a cache of
recent requests, called the duplicate request cache,
for recognizing duplicate non-idempotent requests. If
the server receives a request and recognizes it as a
duplicate of a recently completed request, the server
returns the original completion status instead of
processing the duplicate request again.</t>
        <t>A description of an early implementation of a
duplicate request cache can be found in <xref target="Juszczak"/>.</t>
        <t>For all versions of the NFS_ACL protocol, the SETACL
procedure is considered to be non-idempotent.</t>
      </section>
      <section anchor="caching-policies">
        <name>Caching Policies</name>
        <t>The NFS protocol does not define a policy for
caching on the client or server. In particular, there is no
support for strict cache consistency between a client and
server, nor between different clients.</t>
        <t>The NFS_ACL protocol does not mandate a specific caching
policy for ACLs or information retrieved via the ACCESS
procedure. However, a high-quality client implementation
that seeks good performance might choose to revalidate
cached access control information with the same regularity
that it invalidates normal file attributes.</t>
      </section>
    </section>
    <section anchor="xdr-protocol-definition">
      <name>XDR Protocol Definition</name>
      <t>This section contains a description of the core features of the
NFS_ACL protocol, version 2 and 3, expressed in the XDR language
<xref target="RFC4506"/>.</t>
      <t>This description is provided in a way that makes it simple to
extract into ready-to-compile form.  The reader can apply the
following shell script to this document to produce a
machine-readable XDR description of the NFS_ACL protocol.</t>
      <sourcecode type="sh"><![CDATA[
#!/bin/sh
grep '^ *///' | sed 's?^ /// ??' | sed 's?^ *///$??'
]]></sourcecode>
      <t>That is, if the above script is stored in a file called
"extract.sh" and this document is in a file called "spec.txt",
then the reader can do the following to extract an XDR
description file:</t>
      <sourcecode type="sh"><![CDATA[
sh extract.sh < spec.txt > nfs_acl.x
]]></sourcecode>
      <section anchor="code-component-license">
        <name>Code Component License</name>
        <t>Code components extracted from this document must include
the following license text.  When the extracted XDR code
is combined with other complementary XDR code which itself
has an identical license, only a single copy of the license
text need be preserved.</t>
        <sourcecode type="xdr"><![CDATA[
/// /*
///  * Copyright (c) 2024 IETF Trust and the persons
///  * identified as authors of the code.  All rights reserved.
///  *
///  * The authors of the code are:
///  * Oracle
///  *
///  * Redistribution and use in source and binary forms, with
///  * or without modification, are permitted provided that the
///  * following conditions are met:
///  *
///  * - Redistributions of source code must retain the above
///  *   copyright notice, this list of conditions and the
///  *   following disclaimer.
///  *
///  * - Redistributions in binary form must reproduce the above
///  *   copyright notice, this list of conditions and the
///  *   following disclaimer in the documentation and/or other
///  *   materials provided with the distribution.
///  *
///  * - Neither the name of Internet Society, IETF or IETF
///  *   Trust, nor the names of specific contributors, may be
///  *   used to endorse or promote products derived from this
///  *   software without specific prior written permission.
///  *
///  *   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS
///  *   AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED
///  *   WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
///  *   IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
///  *   FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO
///  *   EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
///  *   LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
///  *   EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
///  *   NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
///  *   SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
///  *   INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
///  *   LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
///  *   OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
///  *   IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
///  *   ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
///  */
///
/// const NFS_ACL_MAX_ENTRIES = 1024;
///
/// typedef unsigned int uid;
/// typedef unsigned short o_mode;
///
/// /*
///  * This is the format of an ACL which is passed over the network.
///  */
/// struct aclent {
///     int type;
///     uid id;
///     o_mode perm;
/// };
///
/// /*
///  * The values for the type element of the aclent structure.
///  */
/// const NA_USER_OBJ = 0x1;            /* object owner */
/// const NA_USER = 0x2;                /* additional users */
/// const NA_GROUP_OBJ = 0x4;           /* owning group of the object */
/// const NA_GROUP = 0x8;               /* additional groups */
/// const NA_CLASS_OBJ = 0x10;          /* file group class and mask entry */
/// const NA_OTHER_OBJ = 0x20;          /* other entry for the object */
/// const NA_ACL_DEFAULT = 0x1000;      /* default flag */
///
/// /*
///  * The bit field values for the perm element of the aclent
///  * structure.  The three values can be combined to form any
///  * of the 8 combinations.
///  */
/// const NA_READ = 0x4;                /* read permission */
/// const NA_WRITE = 0x2;               /* write permission */
/// const NA_EXEC = 0x1;                /* exec permission */
///
/// /*
///  * This is the structure which contains the ACL entries for a
///  * particular entity.  It contains the ACL entries which apply
///  * to this object plus any default ACL entries which are
///  * inherited by its children.
///  *
///  * The values for the mask field are defined below.
///  */
/// struct secattr {
///     unsigned int mask;
///     int aclcnt;
///     aclent aclent<NFS_ACL_MAX_ENTRIES>;
///     int dfaclcnt;
///     aclent dfaclent<NFS_ACL_MAX_ENTRIES>;
/// };
///
/// /*
///  * The values for the mask element of the secattr struct as well
///  * as for the mask element in the arguments in the GETACL2 and
///  * GETACL3 procedures.
///  */
/// const NA_ACL = 0x1;                 /* aclent contains a valid list */
/// const NA_ACLCNT = 0x2;              /* number of entries in the aclent list */
/// const NA_DFACL = 0x4;               /* dfaclent contains a valid list */
/// const NA_DFACLCNT = 0x8;            /* number of entries in the dfaclent list */
///
/// /*
///  * XDR data types inherited from the NFS version 2 protocol
///  */
///
/// enum ftype {
///     NFNON = 0,
///     NFREG = 1,
///     NFDIR = 2,
///     NFBLK = 3,
///     NFCHR = 4,
///     NFLNK = 5,
/// };
///
/// typedef opaque fhandle[FHSIZE];
///
/// struct timeval {
///     unsigned int seconds;
///     unsigned int useconds;
/// };
///
/// struct fattr {
///     ftype        type;
///     unsigned int mode;
///     unsigned int nlink;
///     unsigned int uid;
///     unsigned int gid;
///     unsigned int size;
///     unsigned int blocksize;
///     unsigned int rdev;
///     unsigned int blocks;
///     unsigned int fsid;
///     unsigned int fileid;
///     timeval      atime;
///     timeval      mtime;
///     timeval      ctime;
/// };
///
/// /*
///  * ACL error codes; the numeric values match codes with the same
///  * name used in NFS version 2.
///  */
/// enum aclstat2 {
///     ACL2_OK = 0,
///     ACL2ERR_PERM = 1,
///     ACL2ERR_NOENT = 2,
///     ACL2ERR_IO = 5,
///     ACL2ERR_ACCES = 13,
///     ACL2ERR_NOSPC = 28,
///     ACL2ERR_ROFS = 30,
///     ACL2ERR_DQUOT = 69,
///     ACL2ERR_STALE = 70,
/// };
///
/// /*
///  * NFS_ACL version 2 procedure arguments and results
///  */
///
/// struct GETACL2args {
///     fhandle fh;
///     unsigned int mask;
/// };
///
/// struct GETACL2resok {
///     struct nfsfattr attr;
///     secattr acl;
/// };
///
/// union GETACL2res switch (enum nfsstat status) {
/// case ACL2_OK:
///     GETACL2resok resok;
/// default:
///     void;
/// };
///
/// struct SETACL2args {
///     fhandle fh;
///     secattr acl;
/// };
///
/// struct SETACL2resok {
///     struct nfsfattr attr;
/// };
///
/// union SETACL2res switch (enum nfsstat status) {
/// case ACL2_OK:
///     SETACL2resok resok;
/// default:
///     void;
/// };
///
/// struct GETATTR2args {
///     fhandle fh;
/// };
///
/// struct GETATTR2resok {
///     struct nfsfattr attr;
/// };
///
/// union GETATTR2res switch (enum nfsstat status) {
/// case ACL2_OK:
///     GETATTR2resok resok;
/// default:
///     void;
/// };
///
/// struct ACCESS2args {
///     fhandle fh;
///     uint32 access;
/// };
///
/// const ACCESS2_READ = 0x1;           /* read data or readdir a directory */
/// const ACCESS2_LOOKUP = 0x2;         /* lookup a name in a directory */
/// const ACCESS2_MODIFY = 0x4;         /* rewrite existing file data or */
///                                     /* modify existing directory entries */
/// const ACCESS2_EXTEND = 0x8;         /* write new data or add directory entries */
/// const ACCESS2_DELETE = 0x10;        /* delete existing directory entry */
/// const ACCESS2_EXECUTE = 0x20;       /* execute file (no meaning for a directory) */
///
/// struct ACCESS2resok {
///     struct nfsfattr attr;
///     uint32 access;
/// };
///
/// union ACCESS2res switch (enum nfsstat status) {
/// case ACL2_OK:
///     ACCESS2resok resok;
/// default:
///     void;
/// };
///
/// /*
///  * This is the definition for the GETXATTRDIR procedure which applies
///  * to NFS Version 2 files.
///  */
/// struct GETXATTRDIR2args {
///     fhandle fh;
///     bool create;
/// };
///
/// struct GETXATTRDIR2resok {
///     fhandle fh;
///     struct nfsfattr attr;
/// };
///
/// union GETXATTRDIR2res switch (enum nfsstat status) {
/// case ACL2_OK:
///     GETXATTRDIR2resok resok;
/// default:
///     void;
/// };
///
/// /*
///  * XDR data types inherited from the NFS version 3 protocol
///  */
///
/// typedef unsigned hyper uint64;
/// typedef unsigned long uint32;
/// typedef uint64 fileid3;
/// typedef uint32 uid3;
/// typedef uint32 gid3;
/// typedef uint64 size3;
/// typedef uint32 mode3;
///
/// enum ftype3 {
///     NF3REG    = 1,
///     NF3DIR    = 2,
///     NF3BLK    = 3,
///     NF3CHR    = 4,
///     NF3LNK    = 5,
///     NF3SOCK   = 6,
///     NF3FIFO   = 7
/// };
///
/// struct specdata3 {
///     uint32     specdata1;
///     uint32     specdata2;
/// };
///
/// const NFS3_FHSIZE = 64;
///
/// struct nfs_fh3 {
///     opaque       data<NFS3_FHSIZE>;
/// };
///
/// struct nfstime3 {
///     uint32   seconds;
///     uint32   nseconds;
/// };
///
/// struct fattr3 {
///     ftype3     type;
///     mode3      mode;
///     uint32     nlink;
///     uid3       uid;
///     gid3       gid;
///     size3      size;
///     size3      used;
///     specdata3  rdev;
///     uint64     fsid;
///     fileid3    fileid;
///     nfstime3   atime;
///     nfstime3   mtime;
///     nfstime3   ctime;
/// };
///
/// union post_op_attr switch (bool attributes_follow) {
/// case TRUE:
///     fattr3   attributes;
/// case FALSE:
///     void;
/// };
///
/// /*
///  * ACL error codes; the numeric values match codes with the same
///  * name used in NFS version 3.
///  */
/// enum aclstat3 {
///     ACL3_OK = 0,
///     ACL3ERR_PERM = 1,
///     ACL33ERR_NOENT = 2,
///     ACL3ERR_IO = 5,
///     ACL3ERR_ACCES = 13,
///     ACL3ERR_INVAL = 22,
///     ACL3ERR_NOSPC = 28,
///     ACL3ERR_ROFS = 30,
///     ACL3ERR_DQUOT = 69,
///     ACL3ERR_STALE = 70,
///     ACL3ERR_BADHANDLE = 10001,
///     ACL3ERR_NOTSUPP = 10004,
///     ACL3ERR_SERVERFAULT = 10006,
///     ACL3ERR_JUKEBOX = 10008,
/// };
///
/// /*
///  * NFS_ACL version 3 procedure arguments and results
///  */
///
/// struct GETACL3args {
///     nfs_fh3 fh;
///     unsigned int mask;
/// };
///
/// struct GETACL3resok {
///     post_op_attr attr;
///     secattr acl;
/// };
///
/// struct GETACL3resfail {
///     post_op_attr attr;
/// };
///
/// union GETACL3res switch (aclstat3 status) {
/// case ACL3_OK:
///     GETACL3resok resok;
/// default:
///     GETACL3resfail resfail;
/// };
///
/// struct SETACL3args {
///     nfs_fh3 fh;
///     secattr acl;
/// };
///
/// struct SETACL3resok {
///     post_op_attr attr;
/// };
///
/// struct SETACL3resfail {
///     post_op_attr attr;
/// };
///
/// union SETACL3res switch (aclstat3 status) {
/// case ACL3_OK:
///     SETACL3resok resok;
/// default:
///     SETACL3resfail resfail;
/// };
///
/// /*
///  * This is the definition for the GETXATTRDIR procedure which
///  * applies to NFS Version 3 files.
///  */
/// struct GETXATTRDIR3args {
///     nfs_fh3 fh;
///     bool create;
/// };
///
/// struct GETXATTRDIR3resok {
///     nfs_fh3 fh;
///     post_op_attr attr;
/// };
///
/// union GETXATTRDIR3res switch (aclstat3 status) {
/// case ACL3_OK:
///     GETXATTRDIR3resok resok;
/// default:
///     void;
/// };
///
/// /*
///  * Share the port with the NFS service.
///  */
/// const NFS_ACL_PORT = 2049;
///
/// program NFS_ACL_PROGRAM {
///     version NFS_ACL_V2 {
///         void
///             ACLPROC2_NULL(void) = 0;
///         GETACL2res
///             ACLPROC2_GETACL(GETACL2args) = 1;
///         SETACL2res
///             ACLPROC2_SETACL(SETACL2args) = 2;
///         GETATTR2res
///             ACLPROC2_GETATTR(GETATTR2args) = 3;
///         ACCESS2res
///             ACLPROC2_ACCESS(ACCESS2args) = 4;
///         GETXATTRDIR2res
///             ACLPROC2_GETXATTRDIR(GETXATTRDIR2args) = 5;
///     } = 2;
///     version NFS_ACL_V3 {
///         void
///             ACLPROC3_NULL(void) = 0;
///         GETACL3res
///             ACLPROC3_GETACL(GETACL3args) = 1;
///         SETACL3res
///             ACLPROC3_SETACL(SETACL3args) = 2;
///         GETXATTRDIR3res
///             ACLPROC3_GETXATTRDIR(GETXATTRDIR3args) = 3;
///     } = 3;
/// } = 100227;
]]></sourcecode>
      </section>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <aside>
        <t>This section is to be removed before publishing this document as an RFC.</t>
      </aside>
      <t>This section records the status of known implementations of the
protocol defined by this specification at the time of posting of this
Internet-Draft, and is based on a proposal described in
<xref target="RFC7942"/>. The description of implementations in this section is
intended to assist the IETF in its decision processes in progressing
drafts to RFCs.</t>
      <t>Please note that the listing of any individual implementation here
does not imply endorsement by the IETF. Furthermore, no effort has
been spent to verify the information presented here that was supplied
by IETF contributors. This is not intended as, and must not be
construed to be, a catalog of available implementations or their
features. Readers are advised to note that other implementations may
exist.</t>
      <section anchor="solaris-nfs-server-and-client">
        <name>Solaris NFS server and client</name>
        <t>Organization: Oracle</t>
        <t>URL:       <eref target="https://www.oracle.com">https://www.oracle.com</eref></t>
        <t>Maturity:  Complete.</t>
        <t>Coverage:  All procedures are implemented.</t>
        <t>Licensing: CDDL</t>
        <t>Implementation experience:</t>
      </section>
      <section anchor="linux-nfs-server-and-client">
        <name>Linux NFS server and client</name>
        <t>Organization:  The Linux Foundation</t>
        <t>URL:       <eref target="https://www.kernel.org">https://www.kernel.org</eref></t>
        <t>Maturity:  Complete.</t>
        <t>Coverage:  All procedures except GETXATTRDIR are implemented in
           both versions of the protocol.</t>
        <t>Licensing: GPLv2</t>
        <t>Implementation experience:  The initial Linux implementation
of the NFS_ACL protocol is described in <xref target="Gruenbacher"/>, and
subsequent modifications can be found in the Linux kernel
source code repository <xref target="Linux"/>.</t>
        <t><xref target="Gruenbacher"/> notes several minor differences between the
Linux and Solaris implementations of ACLs, and remarks that:
&gt; Solaris ACLs are based on an earlier draft of POSIX 1003.1e,
&gt; so its handling of the mask ACL entry is slightly different
&gt; than in draft 17 for ACLs with only four ACL entries. This
&gt; is a corner case that occurs only rarely, so the semantic
&gt; differences may not be noticeable.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>An attacker can alter the content of an ACL as it transits
an open network, giving the attacker access to file content
that the ACL is supposed to protect.</t>
      <t>Therefore, implementations of NFS_ACL should protect the
integrity of ACL content when it transits a network. The
use of an integrity-preserving transport layer security
service, such as the GSS Kerberos integrity service, is
strongly recommended.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>In accordance with <xref section="13" sectionFormat="of" target="RFC5531"/>, the editor
requests that IANA update the entry for the NFS ACL
service in the RPC Program Numbers registry to add
the current document as a Reference.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4506">
          <front>
            <title>XDR: External Data Representation Standard</title>
            <author fullname="M. Eisler" initials="M." role="editor" surname="Eisler"/>
            <date month="May" year="2006"/>
            <abstract>
              <t>This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted. This document obsoletes RFC 1832. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="67"/>
          <seriesInfo name="RFC" value="4506"/>
          <seriesInfo name="DOI" value="10.17487/RFC4506"/>
        </reference>
        <reference anchor="RFC5531">
          <front>
            <title>RPC: Remote Procedure Call Protocol Specification Version 2</title>
            <author fullname="R. Thurlow" initials="R." surname="Thurlow"/>
            <date month="May" year="2009"/>
            <abstract>
              <t>This document describes the Open Network Computing (ONC) Remote Procedure Call (RPC) version 2 protocol as it is currently deployed and accepted. This document obsoletes RFC 1831. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5531"/>
          <seriesInfo name="DOI" value="10.17487/RFC5531"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7942">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC1094">
          <front>
            <title>NFS: Network File System Protocol specification</title>
            <author fullname="B. Nowicki" initials="B." surname="Nowicki"/>
            <date month="March" year="1989"/>
            <abstract>
              <t>This RFC describes a protocol that Sun Microsystems, Inc., and others are using. A new version of the protocol is under development, but others may benefit from the descriptions of the current protocol, and discussion of some of the design issues.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1094"/>
          <seriesInfo name="DOI" value="10.17487/RFC1094"/>
        </reference>
        <reference anchor="RFC1813">
          <front>
            <title>NFS Version 3 Protocol Specification</title>
            <author fullname="B. Callaghan" initials="B." surname="Callaghan"/>
            <author fullname="B. Pawlowski" initials="B." surname="Pawlowski"/>
            <author fullname="P. Staubach" initials="P." surname="Staubach"/>
            <date month="June" year="1995"/>
            <abstract>
              <t>This paper describes the NFS version 3 protocol. This paper is provided so that people can write compatible implementations. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1813"/>
          <seriesInfo name="DOI" value="10.17487/RFC1813"/>
        </reference>
        <reference anchor="RFC7530">
          <front>
            <title>Network File System (NFS) Version 4 Protocol</title>
            <author fullname="T. Haynes" initials="T." role="editor" surname="Haynes"/>
            <author fullname="D. Noveck" initials="D." role="editor" surname="Noveck"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>The Network File System (NFS) version 4 protocol is a distributed file system protocol that builds on the heritage of NFS protocol version 2 (RFC 1094) and version 3 (RFC 1813). Unlike earlier versions, the NFS version 4 protocol supports traditional file access while integrating support for file locking and the MOUNT protocol. In addition, support for strong security (and its negotiation), COMPOUND operations, client caching, and internationalization has been added. Of course, attention has been applied to making NFS version 4 operate well in an Internet environment.</t>
              <t>This document, together with the companion External Data Representation (XDR) description document, RFC 7531, obsoletes RFC 3530 as the definition of the NFS version 4 protocol.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7530"/>
          <seriesInfo name="DOI" value="10.17487/RFC7530"/>
        </reference>
        <reference anchor="RFC8881">
          <front>
            <title>Network File System (NFS) Version 4 Minor Version 1 Protocol</title>
            <author fullname="D. Noveck" initials="D." role="editor" surname="Noveck"/>
            <author fullname="C. Lever" initials="C." surname="Lever"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>This document describes the Network File System (NFS) version 4 minor version 1, including features retained from the base protocol (NFS version 4 minor version 0, which is specified in RFC 7530) and protocol extensions made subsequently. The later minor version has no dependencies on NFS version 4 minor version 0, and is considered a separate protocol.</t>
              <t>This document obsoletes RFC 5661. It substantially revises the treatment of features relating to multi-server namespace, superseding the description of those features appearing in RFC 5661.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8881"/>
          <seriesInfo name="DOI" value="10.17487/RFC8881"/>
        </reference>
        <reference anchor="Gruenbacher">
          <front>
            <title>POSIX Access Control Lists on Linux</title>
            <author initials="A." surname="Grünbacher" fullname="Andreas Grünbacher">
              <organization>SuSE Labs</organization>
            </author>
            <date year="2003" month="January"/>
          </front>
          <seriesInfo name="Proceedings" value="of the FREENIX Track: 2003 USENIX Annual Technical Conference, pp. 259-272"/>
          <seriesInfo name="ISBN" value="1-931971-11-0"/>
        </reference>
        <reference anchor="Juszczak">
          <front>
            <title>Improving the Performance and Correctness of an NFS Server</title>
            <author initials="C." surname="Juszcak" fullname="Chet Juszcak">
              <organization>Digital Equipment Corporation</organization>
            </author>
            <date year="1989" month="January"/>
          </front>
          <seriesInfo name="USENIX" value="Conference Proceedings, USENIX Association, Berkeley, CA, pp. 53-63"/>
        </reference>
        <reference anchor="IEEE">
          <front>
            <title>IEEE 1003.1e and 1003.2c: Draft Standard for Information Technology-- Portable Operating System Interface (POSIX)-- Part 1: System Application Program Interface (API) and Part 2: Shell and Utilities, draft 17</title>
            <author>
              <organization>Institute of Electrical and Electronics Engineers</organization>
            </author>
            <date year="1997" month="January"/>
          </front>
        </reference>
        <reference anchor="POSIX">
          <front>
            <title>IEEE Std 1003.1-2001 (Open Group Technical Standard, Issue 6), Standard for Information Technology-- Portable Operating System Interface (POSIX)</title>
            <author>
              <organization>Institute of Electrical and Electronics Engineers</organization>
            </author>
            <date year="2001"/>
          </front>
          <seriesInfo name="ISBN" value="0-7381-3010-9"/>
        </reference>
        <reference anchor="Linux" target="https://www.kernel.org">
          <front>
            <title>Linux kernel source code</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="OpenSolaris" target="https://github.com/kofemann/opensolaris">
          <front>
            <title>Archived OpenSolaris source code</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC1833">
          <front>
            <title>Binding Protocols for ONC RPC Version 2</title>
            <author fullname="R. Srinivasan" initials="R." surname="Srinivasan"/>
            <date month="August" year="1995"/>
            <abstract>
              <t>This document describes the binding protocols used in conjunction with the ONC Remote Procedure Call (ONC RPC Version 2) protocols. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1833"/>
          <seriesInfo name="DOI" value="10.17487/RFC1833"/>
        </reference>
      </references>
    </references>
    <?line 2480?>

<section anchor="source-material">
      <name>Source Material</name>
      <t>The on-the-wire protocol described here is intended to
match existing de factor implementations of NFS_ACL.</t>
      <t>The source for the XDR specification provided in this
document is the nfs_acl.x file as found in published
versions of the OpenSolaris source code base <xref target="OpenSolaris"/>,
an open source descendant of Solaris.</t>
      <t>However, there are a few changes to the protocol as it
was originally described in the OpenSolaris source code
base.</t>
      <section anchor="redaction-of-nfsacl-version-4">
        <name>Redaction of NFS_ACL Version 4</name>
        <t>Version 4 of NFS_ACL is described in the original nfs_acl.x source
file is described this way:</t>
        <ul empty="true">
          <li>
            <t>This is a transitional interface to enable Solaris NFSv4
clients to manipulate ACLs on Solaris servers until the
spec is complete enough to implement this inside the
NFSv4 protocol itself.  NFSv4 does handle extended
attributes in-band.</t>
          </li>
        </ul>
        <t>Because the two non-NULL procedures in this version of the NFS_ACL
protocol were used only as part of a Solaris a prototype and there
are no other implementations of NFS_ACL version 4, it is not included
in the protocol description appearing in this document.</t>
      </section>
      <section anchor="extension-of-nfsacl">
        <name>Extension of NFS_ACL</name>
        <aside>
          <t>Perhaps this document should provide rules for extending the
NFS_ACL protocol, in case some other implementation wishes to
provide additional operations.</t>
        </aside>
      </section>
      <section anchor="code-compilation-requirements">
        <name>Code Compilation Requirements</name>
        <t>The original nfs_acl.x file that appears in the OpenSolaris code
base did not compile using the widely-available rpcgen tool).</t>
        <ul spacing="normal">
          <li>
            <t>The file does not include a definition of the ACL2_OK or
ACL3_OK constants used in definitions of result unions.</t>
          </li>
          <li>
            <t>The file does not include definitions of NFS protocol elements
that are shared with the NFS_ACL protocol, such as fhandle and
post_op_attr.</t>
          </li>
        </ul>
        <t>The XDR specification provided in this document rectifies those
omissions to provide a complete and compilable XDR language
description of the NFS_ACL protocol.</t>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The editor is grateful to
Bill Baker,
Wim Coekaerts,
Andreas Gruenbacher,
Rick Macklem,
Greg Marsden,
Martin Thomson,
Rob Thurlow,
and
Jim Wright
for their input and support.</t>
      <t>Special thanks to
Area Director
Gorry Fairhurst,
NFSV4 Working Group Chairs
Brian Pawlowski
and
Christopher Inacio,
and
NFSV4 Working Group Secretary
Thomas Haynes
for their patience, guidance, and oversight.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
