Re: [nfsv4] Fwd: New Version Notification for draft-cel-nfsv4-rpc-tls-01.txt

Chuck Lever <chuck.lever@oracle.com> Mon, 19 November 2018 21:22 UTC

Return-Path: <chuck.lever@oracle.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 74C49130934 for <nfsv4@ietfa.amsl.com>; Mon, 19 Nov 2018 13:22:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.77
X-Spam-Level:
X-Spam-Status: No, score=-4.77 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.47, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=oracle.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9c3dtuvFG9uB for <nfsv4@ietfa.amsl.com>; Mon, 19 Nov 2018 13:21:59 -0800 (PST)
Received: from userp2120.oracle.com (userp2120.oracle.com [156.151.31.85]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4E88A130DE5 for <nfsv4@ietf.org>; Mon, 19 Nov 2018 13:21:59 -0800 (PST)
Received: from pps.filterd (userp2120.oracle.com [127.0.0.1]) by userp2120.oracle.com (8.16.0.22/8.16.0.22) with SMTP id wAJLJB0R164250 for <nfsv4@ietf.org>; Mon, 19 Nov 2018 21:21:58 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=content-type : mime-version : subject : from : in-reply-to : date : cc : content-transfer-encoding : message-id : references : to; s=corp-2018-07-02; bh=c8dxDLQ+6axkuddFXglm4ALQa0n9jlIAr/0ws7PMQoY=; b=XrCWf50yEA8gDYvi0nirD1f0rRdaby6pb37jLCMiyp5OqYBjVRsHxFFMxvm5ICCKREzT +r/ANTCRvvKGp8izTTiFuCJNhmuR2XWE3PfYwCuOQZEOkZYkNlFRCYrfNKIfeY5VZV1c xZLmaa0Kxe6ogT7aaf6TNoGlrUTYTScIGcJe21TPiNiT9i7XoFVwlgGpKgUq1tviIfIM VbzVlZfVRm18xWo3CCVwCuBfeg+Yw3YC0ehnV58zWb3OnUex2J2et6qUHuJzxJjAl+U/ 5FCQXfglA+30oqv3T1SZ5IvXsWC9fAw+Tx2yDcLAMxxc6ts+EgQEDUQ5CwuasypI4hI2 Fg==
Received: from aserv0021.oracle.com (aserv0021.oracle.com [141.146.126.233]) by userp2120.oracle.com with ESMTP id 2ntbmqgc4r-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <nfsv4@ietf.org>; Mon, 19 Nov 2018 21:21:58 +0000
Received: from userv0122.oracle.com (userv0122.oracle.com [156.151.31.75]) by aserv0021.oracle.com (8.14.4/8.14.4) with ESMTP id wAJLLvKD008928 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <nfsv4@ietf.org>; Mon, 19 Nov 2018 21:21:57 GMT
Received: from abhmp0019.oracle.com (abhmp0019.oracle.com [141.146.116.25]) by userv0122.oracle.com (8.14.4/8.14.4) with ESMTP id wAJLLv1U023933 for <nfsv4@ietf.org>; Mon, 19 Nov 2018 21:21:57 GMT
Received: from anon-dhcp-171.1015granger.net (/68.61.232.219) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Mon, 19 Nov 2018 13:21:56 -0800
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
From: Chuck Lever <chuck.lever@oracle.com>
In-Reply-To: <5BF3258E.5030307@oracle.com>
Date: Mon, 19 Nov 2018 16:21:55 -0500
Cc: nfsv4@ietf.org
Content-Transfer-Encoding: 7bit
Message-Id: <0B95A70F-6333-47B7-956D-91D5786B4149@oracle.com>
References: <154264272736.5235.8955444239583271708.idtracker@ietfa.amsl.com> <50A96C3A-DBA4-4A6C-B883-664E59E24534@oracle.com> <5BF3258E.5030307@oracle.com>
To: Robert Thurlow <robert.thurlow@oracle.com>
X-Mailer: Apple Mail (2.3445.9.1)
X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=9082 signatures=668683
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1811190189
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/0LF6M1gG8FDpO0lHi_cXEKTitl4>
Subject: Re: [nfsv4] Fwd: New Version Notification for draft-cel-nfsv4-rpc-tls-01.txt
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Nov 2018 21:22:02 -0000

Hi Rob-


> On Nov 19, 2018, at 4:05 PM, Rob Thurlow <robert.thurlow@oracle.com> wrote:
> 
> Hi Chuck, some feedback on this nice, short draft:
> 
> On 11/19/18 08:55 AM, Chuck Lever wrote:
> 
> > URL: https://www.ietf.org/internet-drafts/draft-cel-nfsv4-rpc-tls-01.txt
> 
> > However, experience has shown that RPCSEC GSS is challenging to
> > deploy, especially in environments where:
> > ...
> >  o  Host identity management is carried out in a security domain that
> >     is distinct from user identity management.
> 
> I don't think I understand this sub-bullet; do you have
> an example that would clarify?

In a cloud environment, the provider needs to manage the
provision of new hosts. Therefore the provider needs to be
responsible for provisioning per-host authentication material.

The tenant might want to use Kerberos to authenticate her
user base. The tenant can provision a Kerberos realm and KDC.
However, Kerberos forces the use of a model where host and
user identity are both handled by the KDC.

The cloud provider would need administrative access to the
tenant's KDC when provisioning new hosts for the tenant--even
hosts that provide a network service that the tenant's users
never log into.

One scenario I envision is that a tenant can set up Kerberos
for user authentication, while a provider-run PKI can be used
to identify the tenant's hosts.


> > 4.2.  Streams and Datagrams
> >
> >  RPC commonly operates on stream transports and datagram transports.
> >  When operating on a stream transport, using TLS [RFC8446] is
> >  appropriate.  On a datagram transport, RPC can use DTLS [RFC6347].
> 
> Do we point to DTLS anywhere else in our NFS documents?  I'm
> wondering if we want to support datagram service this way.

The NFSv4 documents restrict the use of datagram RPC transports.

However, this document describes a generic RPC-over-TLS mechanism
which could be used for other upper layer protocols that are
permitted to operate on datagram transports.

Maybe I don't understand your comment.


> > 4.3.  Authentication
> 
> Good start here, but I expect that in practice this will
> result in a step down from the state-of-the-art we know -
> RPCSEC_GSS w/krb5p - to TLS + AUTH_SYS, and that this is
> OK because many deployments do not represent multi-user
> clients whose traffic will be multiplexed across one
> single connection.  As I hear the request, this is most
> interesting for NFS traffic inside a server room, with a
> very limited set of user identities in play, and/or with
> non-traditional clients.  We should make some effort to
> describe the interesting use cases to show that we're not
> eviscerating authentication norms for no reason.

The editor's note at the end of this section is meant to flag
this area as needing significantly more discussion. It's not
an area I have much expertise in, so I need some help teasing
out the issues and learning the current state of the TLS art.

I'm also happy to take contributed text.


>> The immediate question I have is whether members of WG feel this
>> topic and document are important enough to promote rpc-tls-01 to
>> Working Group document status. If yes, I can submit the next
>> revision as draft-ietf-nfsv4-rpc-tls-00.
> 
> Yes, this looks like a good start to me.
> 
> Rob T

Thanks for the review!


--
Chuck Lever