Re: [nfsv4] Comments on draft-ietf-nfsv4-integrity-measurement-07

Chuck Lever <chuck.lever@oracle.com> Thu, 31 October 2019 19:54 UTC

Return-Path: <chuck.lever@oracle.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6BC4312085B for <nfsv4@ietfa.amsl.com>; Thu, 31 Oct 2019 12:54:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.301
X-Spam-Level:
X-Spam-Status: No, score=-4.301 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=oracle.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ONmmIj3d8rea for <nfsv4@ietfa.amsl.com>; Thu, 31 Oct 2019 12:54:34 -0700 (PDT)
Received: from aserp2120.oracle.com (aserp2120.oracle.com [141.146.126.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A3DDA120838 for <nfsv4@ietf.org>; Thu, 31 Oct 2019 12:54:27 -0700 (PDT)
Received: from pps.filterd (aserp2120.oracle.com [127.0.0.1]) by aserp2120.oracle.com (8.16.0.27/8.16.0.27) with SMTP id x9VJsE5E081737; Thu, 31 Oct 2019 19:54:24 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=content-type : mime-version : subject : from : in-reply-to : date : cc : content-transfer-encoding : message-id : references : to; s=corp-2019-08-05; bh=cxUtQZSeT3kSxgw3vETww7PXvXxg1MceV+tlq9kForM=; b=OxLajQ1F5DTtrI15kohSIEcDkCpu2e/cOOwOyppjYBURjT0LeBXcfrzB9g+d0dvId7Pg +6cryhxE5oTeZ/3jEJ2xdd4eraqRU3UQB2+4/AVIZjA6TVuOwqvIHD5RTjndVoCDCife dn+fpwKa1AA0sPVKSt7eOlAOZRvSfKOb55PdS+tiCC1IiKyx7xKoshGkj+w8DncHqMnJ RrznaaS6C2oyxVh5+SC8/ekRDFYdwxluGBzyxUciMzLhmDKDMN1kFsWNoyYkvilkZQFC oJJkmudLxm4QO8RVJMlQDzy4AsrapK6iNHxAAtGPFlDC2zUiZ/nH0cTTV4EHqDq/Okjv eA==
Received: from aserp3020.oracle.com (aserp3020.oracle.com [141.146.126.70]) by aserp2120.oracle.com with ESMTP id 2vxwhfnrb1-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 31 Oct 2019 19:54:24 +0000
Received: from pps.filterd (aserp3020.oracle.com [127.0.0.1]) by aserp3020.oracle.com (8.16.0.27/8.16.0.27) with SMTP id x9VJrlpr121728; Thu, 31 Oct 2019 19:54:24 GMT
Received: from aserv0121.oracle.com (aserv0121.oracle.com [141.146.126.235]) by aserp3020.oracle.com with ESMTP id 2vysbv4ng8-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 31 Oct 2019 19:54:24 +0000
Received: from abhmp0022.oracle.com (abhmp0022.oracle.com [141.146.116.28]) by aserv0121.oracle.com (8.14.4/8.13.8) with ESMTP id x9VJsN8r010330; Thu, 31 Oct 2019 19:54:23 GMT
Received: from anon-dhcp-152.1015granger.net (/68.61.232.219) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 31 Oct 2019 12:54:23 -0700
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
From: Chuck Lever <chuck.lever@oracle.com>
In-Reply-To: <20191031192409.GJ88302@kduck.mit.edu>
Date: Thu, 31 Oct 2019 15:54:22 -0400
Cc: spencer shepler <spencer.shepler@gmail.com>, NFSv4 <nfsv4@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <67D69A00-D231-4845-A840-F3D67D629554@oracle.com>
References: <CAFt6BakApq=FJWs+r-jwxvTdXYs9yOg9KS47no93kdnp2gZ_+Q@mail.gmail.com> <9BEBDE7A-522A-4A6B-8132-D9C3A8A4922C@oracle.com> <CAFt6Ba=q=vSt+wtcHsi59gWnwFpuUaDqQue7f=GFSUvd25uV+g@mail.gmail.com> <BFDF314F-B913-4C4A-BAB4-C09FA840F4F6@oracle.com> <CADaq8jc_gM0SWe9weRJYp7s7xjtN9kihbVnUiBN61hF2LUJjzQ@mail.gmail.com> <FD12C92F-BBF4-4174-B896-48738C02B78E@oracle.com> <CAFt6BanwC4uu=9SpZQdiGjFswzkC3cSWPzGia34qBT5W+uuMNw@mail.gmail.com> <5B51BB44-F39D-4EF6-9E1E-3EF958F90260@oracle.com> <20191031192409.GJ88302@kduck.mit.edu>
To: Benjamin Kaduk <kaduk@mit.edu>
X-Mailer: Apple Mail (2.3445.104.11)
X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9427 signatures=668685
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1908290000 definitions=main-1910310197
X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9427 signatures=668685
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1908290000 definitions=main-1910310197
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/ExELSyvP8U4WzLwNHolc7UmYwHc>
Subject: Re: [nfsv4] Comments on draft-ietf-nfsv4-integrity-measurement-07
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Oct 2019 19:54:36 -0000


> On Oct 31, 2019, at 3:24 PM, Benjamin Kaduk <kaduk@mit.edu> wrote:
> 
> A few points/questions inline:
> 
> On Tue, Oct 29, 2019 at 11:33:18AM -0400, Chuck Lever wrote:
>> 
>>> On Oct 29, 2019, at 2:15 AM, spencer shepler <spencer.shepler@gmail.com> wrote:
>>>> 
>>>> On Mon, Oct 28, 2019 at 1:05 PM Chuck Lever <chuck.lever@oracle.com> wrote:
>>>> 
>>>>> On Oct 28, 2019, at 3:28 PM, David Noveck <davenoveck@gmail.com> wrote:
>>>>> 
>>>> 
>>>> In my earlier reply, I proposed breaking this process into two steps:
>>>> 
>>>> 1. Specify how NFS is to transport IMA metadata in an IETF publication
>>>> 2. Specify the Linux IMA metadata format itself in some other venue
>>>> 
>>>> So then:
>>>> 
>>>> 1. would be a Normative extension to the NFS protocol
> 
> I'm probably missing something obvious, but why does it have to be a
> normative extension to the NFS protocol?  Is there some IANA registry with
> a Standards Action registration policy?
> IETF WGs can publish informational documents, is where I'm going with this.

I'm proposing that:

The transport piece would be Normative, as NFS protocol extensions
typically are.

The metadata format would be Informative, just as you suggest.

Not clear to me how making the transport piece Informative would
allay concerns about the metadata format.

Btw, I've added Spencer's review along with some thoughts about how
to address his comments in an issue:

https://github.com/chucklever/i-d-integrity-measurement/issues/7


>>>> 2. might be published by the nfsv4 as an Informative description of the
>>>> metadata format, in lieu of getting this published somewhere else. Think
>>>> of it as an illustrative example rather than a hard specification.
>>>> 
>>>> It still doesn't feel like it's the job of an inter-networking standards
>>>> body to maintain this metadata data format specification, however.
>>>> 
>>>> Does it make sense to publish either a separate Informative document or
>>>> have an Appendix to this document that provides an Informative example
>>>> that gives a specific format for Linux IMA metadata?
>>>> 
>>> Chuck, 
>>> 
>>> Given this last set of responses, you seem to be saying that the only implementation of this capability will be with Linux and that you would be surprised to find any other implementations that would need to implement the support for this feature.
>> 
>> That's not at all what I'm saying.
>> 
>> There is currently no published standard definition of the IMA metadata format.
>> I've made it clear from the very beginning that one does not yet exist, and
>> have asked repeatedly whether this will be a problem. For the past 18 months,
>> I've gotten the answer "no, it shouldn't be, because NFS implementations won't
>> be required to interpret the metadata format."
>> 
>> Thus I'm asking for a protocol extension so that NFS can transport, and NFS
>> servers can store, a particular piece of opaque metadata. This is a narrow
>> scope. All I want to do is store and retrieve this metadata via NFS.
>> 
>> I've been asked to provide the format of the metadata. But at this time, no-one,
>> except for Linux, has stated a plan to actually use it. Thus, this sounds like
>> a piece of this puzzle that can be deferred until it is actually needed (or
>> until someone decides the Linux IMA format is awesome and publishes it).
>> 
>> I'm also not claiming the metadata format should /never/ be published; merely
>> that we don't need this format definition to create a mechanism for storing it.
>> 
>> - Interpretation of the metadata can be left to the future because there is
>>   a clean dividing line between moving the data and parsing it. This allows
>>   the protocol piece of this work to move forward quickly while we wrestle
>>   with the standards issues around the metadata format.
>> 
>> - I don't believe the IETF is the right place to publish the metadata format.
>>   The IETF does networking, not data storage and not Trusted Computing. If
>>   we have to publish anything, it should be Informative only. Or maybe we
>>   can approach another standards setting organization where it would be more
>>   appropriate. I'm open to hear arguments either way about this.
> 
> I'm not arguing that the IETF should take on and publish the Linux IMA
> format (for one, we don't seem to have many people willing to put energy
> into doing so), but I will note that the IETF has recently chartered a WG
> for remote attestation procedures and does have people thinking about
> endpoint security and endpoint assessment (e.g., the SACM WG).

That's interesting! I'll investigate.


>> It seems to me that the only thing that is missing from the current document
>> is a clear statement that this document, by itself, will not enable the
>> implementation of an IMA appraiser on the NFS server or client. The document
>> does not prevent or forbid future publication that would enable such an
>> implementation.
>> 
>> 
>>> So, this is then clearly opening the door for the NFS protocol to be used for implementation specific features and to the point that all that is needed is an opaque attribute and possibly some error codes to go along with it to achieve a side band protocol for that specific implementation.  And if anyone is interested in the feature, a pointer to some "open source" is sufficient.
>>> 
>>> Well, I don't believe that is an appropriate use of the NFS protocol as defined within the IETF.  I apologize if I have the characterization incorrect and would be happy to hear otherwise.
> 
> I think I lack the background to understand why Spencer doesn't believe
> this is an appropriate use of the NFS protocol, but I don't think that this
> is the right thread to educate me.

I'm also interested in learning more about this. The same argument has been
made in the past about extending NFS in general, and I guess I had assumed
that this had been resolved with the publication of RFCs 8178 and 8276.


--
Chuck Lever