Re: [nfsv4] AD review of draft-ietf-nfsv4-rpc-tls

Rick Macklem <rmacklem@uoguelph.ca> Fri, 10 April 2020 15:33 UTC

Return-Path: <rmacklem@uoguelph.ca>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 974043A0C4D for <nfsv4@ietfa.amsl.com>; Fri, 10 Apr 2020 08:33:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r64bjfSQm6P1 for <nfsv4@ietfa.amsl.com>; Fri, 10 Apr 2020 08:33:53 -0700 (PDT)
Received: from CAN01-TO1-obe.outbound.protection.outlook.com (mail-eopbgr670073.outbound.protection.outlook.com [40.107.67.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E8DDD3A0C49 for <nfsv4@ietf.org>; Fri, 10 Apr 2020 08:33:52 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=N78Dtx8h+b+HRQnePy9Fka627UmRuzC+Xe81H3v13W7Q7meg45hHlpz7acAO62GgV9yasHTXwVlt6WV8t9t+ya9VQnyfmfsWe2ifhXD7A4IQDmIbPhRMWoV8b4NpBXNiLGO0xsbE2FgpA3Ksk6x0cmYrgdXXD/0A18qpwttw+OAnPCcOgMukf0G6yI4jbBHDvW7SrmhGmCq5Mio0tD9DWxvnvm5xnSB5iByiF87dfRh+zRN4HfEew4L5XbGUrn3Blxt755CXXwUzrf1UazDDOJSmy09HKY3UFArxO8JQPAP5V9vKHZT6aQ0K961aCWcYBXtJbginyAXhUZJwXBlZ8g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=FeM7h9IC8kMq1ntrJcvHh3qpcvwu0nxl5qW0YeeblZo=; b=enSchiSWdEyv4AcAYBO56QfXfMgbcxmsK+nB4gadpihoajDrU96JL34neLxUaonZjp8dKORm6h4YoegHLm0u1VIXWYLWRMgAanC+uF2h8597+MB5Cj+UocZ5A9nNA+EKwdO8VfMJDnTt87zIjkApd1JNpJlgxbx1lDhaYYHlg56XYcv0Ynq23DVt9Emfk7eFji7ww42p/ZRBFZMTIhs8MEwtDYl5CgL+nzLbxA9xioAZF1dZqFa11lrVlozQQhSLmM3CQKrBDPMv/faYUS3+ORLBNK1L8p6UqwbcgDk/zvqd7IDIDwPX1RwzRsFRtjyUAPlmXp/O3SYy3ZLqJHOYCg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=uoguelph.ca; dmarc=pass action=none header.from=uoguelph.ca; dkim=pass header.d=uoguelph.ca; arc=none
Received: from QB1PR01MB3649.CANPRD01.PROD.OUTLOOK.COM (52.132.86.26) by QB1PR01MB3586.CANPRD01.PROD.OUTLOOK.COM (52.132.86.95) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2878.15; Fri, 10 Apr 2020 15:33:51 +0000
Received: from QB1PR01MB3649.CANPRD01.PROD.OUTLOOK.COM ([fe80::dd96:945c:b6ee:ffa2]) by QB1PR01MB3649.CANPRD01.PROD.OUTLOOK.COM ([fe80::dd96:945c:b6ee:ffa2%6]) with mapi id 15.20.2900.015; Fri, 10 Apr 2020 15:33:51 +0000
From: Rick Macklem <rmacklem@uoguelph.ca>
To: Chuck Lever <chuck.lever@oracle.com>, Trond Myklebust <trondmy@gmail.com>
CC: "nfsv4@ietf.org" <nfsv4@ietf.org>
Thread-Topic: [nfsv4] AD review of draft-ietf-nfsv4-rpc-tls
Thread-Index: AQHWD0eE4VWUacHI/UWM0ZQQ17tmQahyddI9
Date: Fri, 10 Apr 2020 15:33:51 +0000
Message-ID: <QB1PR01MB36492235E6EF60129A0329D7DDDE0@QB1PR01MB3649.CANPRD01.PROD.OUTLOOK.COM>
References: <VI1PR0702MB3775838FD12AB8A89392C17B95C90@VI1PR0702MB3775.eurprd07.prod.outlook.com> <FA2D661E-A787-4772-8F9D-A7594AE82F38@oracle.com> <CADaq8jciLWhL_FMmPcsdrVVS=9Gee8SYAsqi36H5v9iuNo7Pgw@mail.gmail.com> <E414F060-532B-4017-AC7E-5869884B2153@oracle.com> <e5796752c6204ffdd78503b1a9c9045cfd761e52.camel@gmail.com> <F9AC44CE-750E-416A-944D-E2382524020E@oracle.com> <19d2513b1093fc71223e361afca90d1a1ad6183a.camel@gmail.com>, <35D9AEC0-7961-4C44-9715-26409D6182E4@oracle.com>
In-Reply-To: <35D9AEC0-7961-4C44-9715-26409D6182E4@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rmacklem@uoguelph.ca;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 37279dc0-4fa8-4be6-4cf9-08d7dd64924b
x-ms-traffictypediagnostic: QB1PR01MB3586:
x-microsoft-antispam-prvs: <QB1PR01MB35861BC97131E4A135203019DDDE0@QB1PR01MB3586.CANPRD01.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 0369E8196C
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:QB1PR01MB3649.CANPRD01.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFTY:; SFS:(10009020)(39860400002)(136003)(376002)(396003)(366004)(346002)(33656002)(7696005)(6506007)(76116006)(66946007)(66476007)(966005)(8936002)(66446008)(64756008)(66556008)(71200400001)(8676002)(81156014)(2906002)(478600001)(52536014)(110136005)(186003)(55016002)(9686003)(5660300002)(786003)(86362001)(316002)(4326008); DIR:OUT; SFP:1101;
received-spf: None (protection.outlook.com: uoguelph.ca does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: Pp+dKAjVSR0C1jCCSA1uWdBDVzA7ebOMZcKKNN3gJHz3+78wGmpHuVasyeD3hR9JtbHqfz8RZYjbw9/A6ZA5BrIaOJi7szMEIbaHGUi8+/5d19FHhkbYKFcD9Jmzj+D9DmanNyAEMAKjRmjMW3M4G8uEC4v8H8GaXdsc2RaJJ2mq0+CA+u4MKuMvHFXjJreyZTtzUl5ibK2KcKWwAx/tTg==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: uoguelph.ca
X-MS-Exchange-CrossTenant-Network-Message-Id: 37279dc0-4fa8-4be6-4cf9-08d7dd64924b
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Apr 2020 15:33:51.5921 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: be62a12b-2cad-49a1-a5fa-85f4f3156a7d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: CORkKnm2LdP3bHy6HqJ5SzEGDtm3gqYTbCsSwxzWZrp2K3nFU6qUEB1LGM2JLew3+9NsRYOZryL5qGQwu3B7ng==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: QB1PR01MB3586
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/IoS4h_sNSMkscsa_v360thKcfvs>
Subject: Re: [nfsv4] AD review of draft-ietf-nfsv4-rpc-tls
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Apr 2020 15:33:55 -0000

Chuck Lever wrote:
[stuff snipped]
>Then I started thinking about TCP.
>
>Since we have implementations that use the same connection to transport
>multiple RPC programs, we have to make a different statement. What should
>that statement be?
>
>I wondered again about whether it makes sense to permit or encourage
>multiple TLS sessions on the same connection.
>
>If you wanted to, how would you establish a second TLS session? Because
>of the "no clear-text RPCs after a TLS session has been established"
>stipulation, the client would have to perform a bunch of AUTH_TLS probes
>_before_ sending any ClientHello messages.
>
>(And in any event we probably want rpc-tls to discuss what should happen
>if there is traffic on the connection between the AUTH_TLS probe and
>the ClientHello message).
I think that multiple AUTH_TLS probes before sending ClientHello
is both difficult to implement and confusing.

The AUTH_TLS probe serves two purposes well.
1 - It establishes whether or not RPC-over-TLS is supported by the server.
2 - If supported, it triggers a TLS handshake for the first session.

If you do want multiple TLS sessions on the same TCP connection (I'll assume TLS
allows this?), then I think a separate kind of AUTH_TLS Null RPC which is done
within a TLS session would be a more appropriate way to establish it.
(This one could have a non-NULL credential to differentiate it from the initial one.)

>But it's likely that multiple TLS sessions makes sense only when there
>are multiple certificates on the client side. So this is very likely
>out of scope for rpc-tls. Then do we explicitly forbid the use of
>multiple TLS sessions per connection for this iteration of RPC-on-TLS?
Yes, I would agree with this.

However, I do not see why multiple RPC programs cannot be allowed on
the same TCP connection using the same TLS session and I don't see that
the RPC program number used for the AUTH_TLS probe need imply
"only this program for this session".
Of course, this typically does not happen, since same TCP connection
implies same server port# and FreeBSD does not do this at this time.
So, as such, I really do not care whether or not a "only one RPC program
per TCP connection" restriction exists.

rick


--
Chuck Lever



_______________________________________________
nfsv4 mailing list
nfsv4@ietf.org
https://www.ietf.org/mailman/listinfo/nfsv4