Re: [nfsv4] New Version Notification for draft-cel-nfsv4-linux-seclabel-xtensions-00.txt

Chuck Lever <chuck.lever@oracle.com> Thu, 03 May 2018 15:13 UTC

Return-Path: <chuck.lever@oracle.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 46001127076 for <nfsv4@ietfa.amsl.com>; Thu, 3 May 2018 08:13:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.709
X-Spam-Level:
X-Spam-Status: No, score=-2.709 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=oracle.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id icO3koHa2ald for <nfsv4@ietfa.amsl.com>; Thu, 3 May 2018 08:13:43 -0700 (PDT)
Received: from userp2130.oracle.com (userp2130.oracle.com [156.151.31.86]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A5D511241F3 for <nfsv4@ietf.org>; Thu, 3 May 2018 08:13:43 -0700 (PDT)
Received: from pps.filterd (userp2130.oracle.com [127.0.0.1]) by userp2130.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w43F5v3i060594; Thu, 3 May 2018 15:13:42 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=content-type : mime-version : subject : from : in-reply-to : date : cc : content-transfer-encoding : message-id : references : to; s=corp-2017-10-26; bh=xJd3XCSER7HQbxS/ote/NG76Oi63yN95NLBPYpYiARE=; b=jsPyTTv6OYPp4wIse3XKPq2zR1DpnZiy08qB67RoWNLlW5KUnIKJbd79+RpnHJ/sUspW NvOW9kZNnm/dxz+xN9cMKxiCFOotu4jpqUG5q0bFsVzrJYivxMU/OqnvHAgapPxtpOPU e+9TVTCn1ETA8nqYLYAJ412LsY7RoEWcS95AAX3S9NsXhkzD8Yxuqxg6vMKRUGMBBKiz eo1lbof5VvCUI/tj6kQAXPtwnjdEfTE/V+vMWfhUCgHxN4BZmrwh90QG5wsBEBzMHRbv cuOZXA80v1gdOc/N0Em4rJP6LDQYKYB/ICm8//sxRZDqaK3yNOj0EN9M2MgW2Wleg8aF oQ==
Received: from userv0022.oracle.com (userv0022.oracle.com [156.151.31.74]) by userp2130.oracle.com with ESMTP id 2hmgdjt9dv-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 03 May 2018 15:13:41 +0000
Received: from userv0121.oracle.com (userv0121.oracle.com [156.151.31.72]) by userv0022.oracle.com (8.14.4/8.14.4) with ESMTP id w43FDfsd016653 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 3 May 2018 15:13:41 GMT
Received: from abhmp0015.oracle.com (abhmp0015.oracle.com [141.146.116.21]) by userv0121.oracle.com (8.14.4/8.13.8) with ESMTP id w43FDfTj003518; Thu, 3 May 2018 15:13:41 GMT
Received: from anon-dhcp-171.1015granger.net (/68.61.232.219) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 03 May 2018 08:13:40 -0700
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 11.3 \(3445.6.18\))
From: Chuck Lever <chuck.lever@oracle.com>
In-Reply-To: <20180503150315.GA14163@fieldses.org>
Date: Thu, 03 May 2018 11:13:39 -0400
Content-Transfer-Encoding: 7bit
Message-Id: <3781A107-ED0A-400C-9A6F-0F0E89FDB49B@oracle.com>
References: <152337099624.13448.11040477333954216664.idtracker@ietfa.amsl.com> <FB6B8D57-CEF6-46E1-97C7-E43C7E49752F@oracle.com> <2CBB38A6-45FF-46A4-96A5-5D1B431E1365@gmail.com> <106AF901BBB25B4082BCE4FEC2F79D440627CED6@ORSMSX108.amr.corp.intel.com> <C388AE74-D240-4CFE-92A3-D0D6B0D31077@oracle.com> <20180503150315.GA14163@fieldses.org>
To: NFSv4 <nfsv4@ietf.org>
X-Mailer: Apple Mail (2.3445.6.18)
X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=8881 signatures=668698
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1805030133
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/-Tty0Lfjfq17WDRlK0BffCDL_T4>
Subject: Re: [nfsv4] New Version Notification for draft-cel-nfsv4-linux-seclabel-xtensions-00.txt
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 May 2018 15:13:45 -0000


> On May 3, 2018, at 11:03 AM, J. Bruce Fields <bfields@fieldses.org> wrote:
> 
> On Wed, May 02, 2018 at 06:50:31PM -0400, Chuck Lever wrote:
>>> On May 2, 2018, at 6:36 PM, Quigley, David <david.quigley@intel.com>
>>> wrote: Also having them as 3 different LFS ids make no sense. The
>>> LFS is supposed to describe the format of what you are sending and
>>> receiving for the sec_label field. Unless something changed in the
>>> last rounds of revisions to the sec_label support there should only
>>> be one value per file?
>> 
>> A file can have capabilities associated with it, a security.ima xattr,
>> and a security.evm xattr. All three are separate objects and can
>> change independently of each other. Capabilities and IMA are not at
>> all related to each other, so at least these two need separate LSF
>> numbers.
> 
> The client doesn't have a way to query them separately.  All you can do
> is send a GETATTR {FATTR4_SEC_LABEL}, and then the server can only
> return one thing.  So, I agree, overloading the security labels in this
> way doesn't work.  I overlooked that!
> 
> It's no problem to define a couple new attributes instead, let's just do
> that.  That will also give clients an easy way to query for IMA or
> file capability support by querying the supported_attrs attributes.

That's what I was thinking too. Dave's extensibility work should make it
straightforward to add these new attributes.

In terms of I-Ds, perhaps I should specify the new IMA and file capabilities
attributes in separate documents. Is it still reasonable to submit the first
revision of these as WG documents rather than personal drafts?


--
Chuck Lever