Re: [nfsv4] Fwd: New Version Notification for draft-haynes-nfsv4-flex-filesv2-00.txt
Olga Kornievskaia <aglo@citi.umich.edu> Tue, 08 August 2017 19:19 UTC
Return-Path: <olga.kornievskaia@gmail.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B482E132A92 for <nfsv4@ietfa.amsl.com>; Tue, 8 Aug 2017 12:19:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.699
X-Spam-Level:
X-Spam-Status: No, score=-1.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.199, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PhDBLFFoVQgE for <nfsv4@ietfa.amsl.com>; Tue, 8 Aug 2017 12:19:44 -0700 (PDT)
Received: from mail-qt0-x22d.google.com (mail-qt0-x22d.google.com [IPv6:2607:f8b0:400d:c0d::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5EDC4132A8C for <nfsv4@ietf.org>; Tue, 8 Aug 2017 12:19:44 -0700 (PDT)
Received: by mail-qt0-x22d.google.com with SMTP id t37so24935862qtg.5 for <nfsv4@ietf.org>; Tue, 08 Aug 2017 12:19:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc:content-transfer-encoding; bh=mRwKWwEsMqq64ixiQjciPumj9Eg3Rm5LFwXNDiUOxCw=; b=iqKh2fJqHJjv9TPtCli2C+6QEgx6wRZeBp+NUGCCCw2hXmdAVMibr8IwERBpQzmuVH 34tmUhA/o1H43sLKtymnQMhGaQ4cu9D5e5npV3pvJvIYqeSxQA7xfI6fiY84hElBfKUR fAvEr9GL4xQdZBg4E6ol6UOuknNFiE/1M8DZ3CFGM1CohE2RagyyS2BgKAR7BJi34rW3 CM3muInkwaTyaOPXfxg7rGiNAnriUQzMT/tNDBU8vDz1n+bZBDmGeNQgabSN4sensK9n tm56zA4OWmeQJXKOyhsWpbAbDNktzpOI8FkDXc/SdSFwcwdKyrwE1PYxJeGfnDiRpzLa 7akA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc:content-transfer-encoding; bh=mRwKWwEsMqq64ixiQjciPumj9Eg3Rm5LFwXNDiUOxCw=; b=XSyvfBk7pI4BBpOq+JF8xmdwjSfyMASU8JkGA2AX+8Ex41VdsF6gCtpusi0xU0sRZL jNC7dM255MQJr4pu8/+5EqQOBXuA2+JWIRVVYPGiqLf3a7FMHlrr/Q0JrRHZu2O6rsw4 5124rpJigGVHrIqXIn0S3WgAtetJprOId/CiaOxUiD+EUpcMl3hjfG9P/xE24citimdd qqF5JLlgZ3TtyUXBmf3IgBfws/JOeOOcWh0Bwo6asOCUUJZM57pnTqPHqhD+4hc7fmy0 vTulIyMGxz2p6WuyawVqi6v+Z8zgFGWOPFdGkSxXDO1okXa0okb2PKiR/yx1j7di68y0 CEqg==
X-Gm-Message-State: AHYfb5gTys25vhstVS4IHY+kxlfCRS3Dv3VQRpIPq1zPiHeHBDgjleNx UqTXGDwUFbLNbBvMIR4EspLJskfprQ==
X-Received: by 10.200.47.247 with SMTP id m52mr7483360qta.187.1502219983368; Tue, 08 Aug 2017 12:19:43 -0700 (PDT)
MIME-Version: 1.0
Sender: olga.kornievskaia@gmail.com
Received: by 10.12.186.148 with HTTP; Tue, 8 Aug 2017 12:19:42 -0700 (PDT)
In-Reply-To: <CAABAsM6rmrDU4BR6Ho7YFjjYA2amEkwuRGtzN537VXUZ-Eh-hg@mail.gmail.com>
References: <150215110527.12392.18161698955589691126.idtracker@ietfa.amsl.com> <2CA259E3-BD3A-482B-BFBF-3B90425AD3EA@primarydata.com> <CAN-5tyETNMCPVC5wJ-_77vM5+hVB+-uasd37kn+M=hoCeK6P7w@mail.gmail.com> <CAABAsM6rmrDU4BR6Ho7YFjjYA2amEkwuRGtzN537VXUZ-Eh-hg@mail.gmail.com>
From: Olga Kornievskaia <aglo@citi.umich.edu>
Date: Tue, 08 Aug 2017 15:19:42 -0400
X-Google-Sender-Auth: egQ8ru-hP0fhO1rPVkwf2w9IMpY
Message-ID: <CAN-5tyGw-gAtuRSQrbWxgtyO_dQhcVYNJ-6O-UXeC7wXt6H1oA@mail.gmail.com>
To: Trond Myklebust <trondmy@gmail.com>
Cc: Thomas Haynes <loghyr@primarydata.com>, "nfsv4@ietf.org" <nfsv4@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/7R6elKOJUxVwnNUiQKzPRfldXww>
Subject: Re: [nfsv4] Fwd: New Version Notification for draft-haynes-nfsv4-flex-filesv2-00.txt
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Aug 2017 19:19:47 -0000
For the client to authenticate to the server, it needs a service ticket. A ticket carries a secret key encrypted with something known only to the server. A client proves he knows the key inside the ticket by encrypting a payload with that key (and presents the ticket as well). KDC (MDS) encrypts that secret with something known only to KDC and the client. RPCSEC_GSS session handle is a number (allows to locate the real crypto to use to decrypt the payload). It has no crypto, there is no security there. On Tue, Aug 8, 2017 at 2:54 PM, Trond Myklebust <trondmy@gmail.com> wrote: > Why pass Kerberos tickets around? Is there any reason not to just pass an > initialised RPCSEC_GSS session handle? > > Cheers > Trond > > On 8 August 2017 at 11:56, Olga Kornievskaia <aglo@citi.umich.edu> wrote: >> >> Hi Tom, >> >> Are you planning to expand the 4.1.1? The same comment that I wrote on >> my last email applies here where I suggested to specify 4things. It's >> needed to have interoperable implementations. As something can choose >> to return back TGTs (something like and AS_REP) and some might return >> server tickets (something like a TGS-REP). Some server implementation >> might encrypt needed info under the session key from the secured >> communication, some might encrypt it with the user's main key. How >> would the client know what to expect? >> >> Also when I wrote about opaque_auth being 400bytes I was talking about >> including just a single credential reply back. I'm looking on the >> network trace and my AS_REP is 801bytes and TGS_REP is 960bytes. And >> if somebody plans to include any authorization data in their tickets, >> well that will blow up even more. >> >> On Mon, Aug 7, 2017 at 8:25 PM, Thomas Haynes <loghyr@primarydata.com> >> wrote: >> > So here is a first hack at Flex Files v2. I thought it would come in >> > much >> > smaller than 11 pages, >> > so perhaps some pruning will be necessary. >> > >> > I’m aware Ben had some comments on: >> > >> > Can I suggest putting in a typed opaque auth blob instead of explicit >> > synthetic uid/gid fields? >> > >> > I have purposely done: >> > >> > /// struct ffv2_data_server4 { >> > /// deviceid4 ffds_deviceid; >> > /// uint32_t ffds_efficiency; >> > /// stateid4 ffds_stateid<>; >> > /// nfs_fh4 ffds_fh_vers<>; >> > /// fattr4_owner ffds_user; >> > /// fattr4_owner_group ffds_group; >> > /// opaque_auth ffds_auth; >> > /// }; >> > >> > Because of AI1: >> > >> > [[AI1: after the lesson learned from ffds_stateid, we either need to >> > put >> > an >> > array here or define all of the file handles to share the same >> > credentials. And as Olga points out in her email, this gets big >> > fast. Especially if we throw in many mirrored copies! --TH]] >> > >> > I.e., the ffds_auth is inside an array of ffv2_data_server4 which is >> > in itself inside an array of ffv2_mirror4 AND it could be argued that >> > ffds_auth (and ffds_user/ffds_group) need to be an array. >> > >> > Even if we decide to make all FHs share the same credentials, we >> > eventually can hit a limit of the number of mirrored copies. >> > >> > And Ben, the other reason not to use a typed opaque auth blob >> > is because the ffds_user and ffds_group are strings, and do >> > not fit into AUTH_UNIX. We could define AUTH_SYNTHETIC. :-) >> > >> > Begin forwarded message: >> > >> > From: <internet-drafts@ietf.org> >> > Subject: New Version Notification for >> > draft-haynes-nfsv4-flex-filesv2-00.txt >> > Date: August 7, 2017 at 5:11:45 PM PDT >> > To: Thomas Haynes <thomas.haynes@primarydata.com> >> > >> > >> > A new version of I-D, draft-haynes-nfsv4-flex-filesv2-00.txt >> > has been successfully submitted by Thomas Haynes and posted to the >> > IETF repository. >> > >> > Name: draft-haynes-nfsv4-flex-filesv2 >> > Revision: 00 >> > Title: Parallel NFS (pNFS) Flexible File Layout v2 >> > Document date: 2017-08-07 >> > Group: Individual Submission >> > Pages: 11 >> > URL: >> > >> > https://www.ietf.org/internet-drafts/draft-haynes-nfsv4-flex-filesv2-00.txt >> > Status: >> > https://datatracker.ietf.org/doc/draft-haynes-nfsv4-flex-filesv2/ >> > Htmlized: >> > https://tools.ietf.org/html/draft-haynes-nfsv4-flex-filesv2-00 >> > Htmlized: >> > https://datatracker.ietf.org/doc/html/draft-haynes-nfsv4-flex-filesv2-00 >> > >> > >> > Abstract: >> > The Parallel Network File System (pNFS) allows a separation between >> > the metadata (onto a metadata server) and data (onto a storage >> > device) for a file. The flexible file layout type is an extension to >> > pNFS which allows the use of storage devices in a fashion such that >> > they require only a quite limited degree of interaction with the >> > metadata server, using already existing protocols. This document >> > describes two extensions to the flexible file layout type to allow >> > for multiple stateids for tightly coupled NFSv4 models and an >> > additional security mechanism for loosely coupled models. >> > >> > >> > >> > >> > Please note that it may take a couple of minutes from the time of >> > submission >> > until the htmlized version and diff are available at tools.ietf.org. >> > >> > The IETF Secretariat >> > >> > >> > >> > _______________________________________________ >> > nfsv4 mailing list >> > nfsv4@ietf.org >> > https://www.ietf.org/mailman/listinfo/nfsv4 >> > >> >> _______________________________________________ >> nfsv4 mailing list >> nfsv4@ietf.org >> https://www.ietf.org/mailman/listinfo/nfsv4 > >
- [nfsv4] Fwd: New Version Notification for draft-h… Thomas Haynes
- Re: [nfsv4] Fwd: New Version Notification for dra… David Noveck
- Re: [nfsv4] Fwd: New Version Notification for dra… Olga Kornievskaia
- Re: [nfsv4] Fwd: New Version Notification for dra… Trond Myklebust
- Re: [nfsv4] Fwd: New Version Notification for dra… Benjamin Kaduk
- Re: [nfsv4] Fwd: New Version Notification for dra… Olga Kornievskaia
- Re: [nfsv4] Fwd: New Version Notification for dra… Trond Myklebust
- Re: [nfsv4] Fwd: New Version Notification for dra… Benjamin Kaduk
- Re: [nfsv4] Fwd: New Version Notification for dra… Olga Kornievskaia
- Re: [nfsv4] Fwd: New Version Notification for dra… Benjamin Kaduk
- Re: [nfsv4] Fwd: New Version Notification for dra… Olga Kornievskaia
- Re: [nfsv4] Fwd: New Version Notification for dra… Trond Myklebust
- Re: [nfsv4] Fwd: New Version Notification for dra… Olga Kornievskaia
- Re: [nfsv4] Fwd: New Version Notification for dra… Trond Myklebust
- Re: [nfsv4] Fwd: New Version Notification for dra… Olga Kornievskaia
- Re: [nfsv4] New Version Notification for draft-ha… Thomas Haynes
- Re: [nfsv4] New Version Notification for draft-ha… Thomas Haynes
- Re: [nfsv4] Fwd: New Version Notification for dra… Benjamin Kaduk
- Re: [nfsv4] Fwd: New Version Notification for dra… Trond Myklebust
- Re: [nfsv4] Fwd: New Version Notification for dra… Olga Kornievskaia
- Re: [nfsv4] Fwd: New Version Notification for dra… Trond Myklebust
- [nfsv4] Minorversioning [was Re: New Version Noti… Thomas Haynes
- Re: [nfsv4] Minorversioning [was Re: New Version … David Noveck
- Re: [nfsv4] Fwd: New Version Notification for dra… J. Bruce Fields
- Re: [nfsv4] Fwd: New Version Notification for dra… Benjamin Kaduk