Re: [nfsv4] Comments on draft-ietf-nfsv4-integrity-measurement-07

Chuck Lever <chuck.lever@oracle.com> Mon, 28 October 2019 20:05 UTC

Return-Path: <chuck.lever@oracle.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1C32312006D for <nfsv4@ietfa.amsl.com>; Mon, 28 Oct 2019 13:05:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.301
X-Spam-Level:
X-Spam-Status: No, score=-4.301 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=oracle.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Rhx7-xKCMlYm for <nfsv4@ietfa.amsl.com>; Mon, 28 Oct 2019 13:05:38 -0700 (PDT)
Received: from aserp2120.oracle.com (aserp2120.oracle.com [141.146.126.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BEC9212004E for <nfsv4@ietf.org>; Mon, 28 Oct 2019 13:05:38 -0700 (PDT)
Received: from pps.filterd (aserp2120.oracle.com [127.0.0.1]) by aserp2120.oracle.com (8.16.0.27/8.16.0.27) with SMTP id x9SK4Isd035487; Mon, 28 Oct 2019 20:05:37 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=content-type : mime-version : subject : from : in-reply-to : date : cc : content-transfer-encoding : message-id : references : to; s=corp-2019-08-05; bh=bMIm0SZBq6tuVJ+BJaasEa/6te2e421QtnHoVSXbzxw=; b=CUTL6yoZusG/Zvt4L77HaO++fdR64Tj8TMXHSxbb6+7W+INal/GfESfYukgKV6b7zBD6 7l4QUyLSnvfN3VvREcYyJy07HRIbcsGTY5qVDOBmBC6CK92euYn5KczjWzE4KZudeCK8 CqEt1PHsgK84Dorau2yBzkd89viC4pRrdXm0NuHf46HmsmDHscMhn9UvBsDlmsiROO3h rGrrTLpj/DF9jwangBMyF1wotPVX9mwd7Udwx7nJLcKBlvmACFP8cWPP76zgU8lC8Sxb RSLS4dbBwiBdtJ8Lh2pTQhXMgzovtkkOuosAtVh9IJ8+nVdXBNQwIBSz1LwTyovWBWpS Zw==
Received: from aserp3030.oracle.com (aserp3030.oracle.com [141.146.126.71]) by aserp2120.oracle.com with ESMTP id 2vve3q4bje-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 28 Oct 2019 20:05:37 +0000
Received: from pps.filterd (aserp3030.oracle.com [127.0.0.1]) by aserp3030.oracle.com (8.16.0.27/8.16.0.27) with SMTP id x9SK3drC149376; Mon, 28 Oct 2019 20:05:36 GMT
Received: from aserv0121.oracle.com (aserv0121.oracle.com [141.146.126.235]) by aserp3030.oracle.com with ESMTP id 2vwakyme4g-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 28 Oct 2019 20:05:36 +0000
Received: from abhmp0018.oracle.com (abhmp0018.oracle.com [141.146.116.24]) by aserv0121.oracle.com (8.14.4/8.13.8) with ESMTP id x9SK5ap8007599; Mon, 28 Oct 2019 20:05:36 GMT
Received: from anon-dhcp-153.1015granger.net (/68.61.232.219) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Mon, 28 Oct 2019 13:05:36 -0700
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
From: Chuck Lever <chuck.lever@oracle.com>
In-Reply-To: <CADaq8jc_gM0SWe9weRJYp7s7xjtN9kihbVnUiBN61hF2LUJjzQ@mail.gmail.com>
Date: Mon, 28 Oct 2019 16:05:34 -0400
Cc: spencer shepler <spencer.shepler@gmail.com>, NFSv4 <nfsv4@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <FD12C92F-BBF4-4174-B896-48738C02B78E@oracle.com>
References: <CAFt6BakApq=FJWs+r-jwxvTdXYs9yOg9KS47no93kdnp2gZ_+Q@mail.gmail.com> <9BEBDE7A-522A-4A6B-8132-D9C3A8A4922C@oracle.com> <CAFt6Ba=q=vSt+wtcHsi59gWnwFpuUaDqQue7f=GFSUvd25uV+g@mail.gmail.com> <BFDF314F-B913-4C4A-BAB4-C09FA840F4F6@oracle.com> <CADaq8jc_gM0SWe9weRJYp7s7xjtN9kihbVnUiBN61hF2LUJjzQ@mail.gmail.com>
To: David Noveck <davenoveck@gmail.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9424 signatures=668685
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1908290000 definitions=main-1910280190
X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9424 signatures=668685
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1908290000 definitions=main-1910280190
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/EYyeB8-BRGXwsgajkLhzeZOLVPU>
Subject: Re: [nfsv4] Comments on draft-ietf-nfsv4-integrity-measurement-07
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Oct 2019 20:05:40 -0000


> On Oct 28, 2019, at 3:28 PM, David Noveck <davenoveck@gmail.com> wrote:
> 
> > Appraisal is done at the point when file content is about to be used.
> > With NFS, most frequently that would be on an NFS client system. That
> > does not mean the NFS client implementation itself does the appraisal.
> 
> Perhaps not but the fact is that if you want to have a client implementation
> you need to know the formal so that appraisal can be done correctly.   The
> fact that this is not within the Linucx Client as you would describe it is to me
> a distinction without a difference.
> 
> > Suppose an OS implementer wants to implement something that interoperates
> > with Linux's IMA. It is up to that implementer to approach the Linux IMA
> > community and get them to provide this information.
> 
> That is the problem that people are concerned about.   I think some people
> want one now  and I can see their point although I don't have any need for this
> data.

That's my problem with the request: no-one here has a real need
for this metadata format except for Linux, where it is already
implemented.

The only fresh real-world need is to be able to store and transport
this metadata on behalf of OS implementations that can generate and
interpret it.

Thus the additional request for a specific format definition seems
specious to me.


> > Does anyone have suggestions as to where the Linux IMA community should
> > go to publish a standard describing the integrity metadata format?
> > Maybe the Trusted Computing Group ? Somewhere else?
> 
> I have no suggestions in this regard but am sure that if the Linux IMA community
> were willing to do this it could find some place suitable.
> 
> > Would it make sense to make up our own integrity metadata format just
> > for NFS? 
> 
> No.
> 
> > Or, perhaps we leave this explicitly to storage vendors to enable
> > them to innovate. 
> 
> I don't see much much interest in that.
> 
> > As the generation and appraisal of this metadata occurs
> > outside of the filesystem, it is possible to provide plug-ins that handle
> > this.
> 
> But to interoperate successfully everybody's plug-in would have to implement the
> same format.   That's why a specification of that format is needed to provide 
> interoperability.
> 
> > The discussion in the room during IETF 105 suggested there was interest
> > enough to move this document forward to publication. 
> 
> There was and there still is.
> 
> > I thought this
> > whole issue had been resolved at that time, as the conversation finished
> > with an understanding that this was opaque metadata 
> 
> It did but apparently there were people not present who now feel that it cannot
> be treated as totally opaque and needs to be documented. 
> 
> > the next step was WGLC.
> 
> I still think it should be.   However, during WGLC, objections  will 
> inevitably be offered to the lack of a specfication of the integrity 
> metadata fomat.

If the document is clear that this is a transport protocol, and treats
the metadata as opaque, they should have the same reaction as others
did during our conversation at IETF 105: that this is perfectly
reasonable for a transport protocol.


> While I don't need this and would prefer that 
> this go forward even without it, I don't feel that these objections 
> can simply be dismissed.
> 
> > Of the two options, IMO option 1 is the only sensible one because there
> > is no citable specification of what goes in the metadata.
> 
> The alternative is to create one.   I don't understand why it is so difficult
> given that there is an implementation that can be examined to determine
> the format.

The difficulty isn't that I can't look at the format and spell it out
somewhere, but rather: If the IETF documents this format, then the IETF
becomes responsible for publishing it as a standard. I don't think either
the Linux community or the IETF wants to take this step with something so
far outside of the purview of either the IETF or the nfsv4 WG. It ties
everyone down -- and as mentioned above, there doesn't yet seem to be
any need for that.

In my earlier reply, I proposed breaking this process into two steps:

1. Specify how NFS is to transport IMA metadata in an IETF publication
2. Specify the Linux IMA metadata format itself in some other venue

So then:

1. would be a Normative extension to the NFS protocol

2. might be published by the nfsv4 as an Informative description of the
metadata format, in lieu of getting this published somewhere else. Think
of it as an illustrative example rather than a hard specification.

It still doesn't feel like it's the job of an inter-networking standards
body to maintain this metadata data format specification, however.

Does it make sense to publish either a separate Informative document or
have an Appendix to this document that provides an Informative example
that gives a specific format for Linux IMA metadata?


--
Chuck Lever