Re: [nfsv4] RFC: Combining RPC-with-TLS and sec=krb5

Chuck Lever III <chuck.lever@oracle.com> Sun, 01 January 2023 17:13 UTC

Return-Path: <chuck.lever@oracle.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 92B56C14F692 for <nfsv4@ietfa.amsl.com>; Sun, 1 Jan 2023 09:13:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.798
X-Spam-Level:
X-Spam-Status: No, score=-2.798 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=oracle.com header.b=1GOOGR8d; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.b=tmXDqjBL
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Tff5nL3wekYX for <nfsv4@ietfa.amsl.com>; Sun, 1 Jan 2023 09:13:07 -0800 (PST)
Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D3A01C14F607 for <nfsv4@ietf.org>; Sun, 1 Jan 2023 09:13:07 -0800 (PST)
Received: from pps.filterd (m0246629.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 301H0927022737; Sun, 1 Jan 2023 17:13:06 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=corp-2022-7-12; bh=104fWbqfCF7LiLYmFOduIjW04o06QjxMS3ksnxfhRk0=; b=1GOOGR8dGtoj4WytdB0yPB/e4jiO3fjJRrtcG9EclYCDNARMaU3IxANeDxxaEFEPHIjd SJXLl/QqBBDG31AUDAQ0G2qpkkAwQlGqXAHbLPtFPIHf6z3kxjwiVkyi+UWIstN5JKrZ BeKtCIJcDFjjziQCsXPFtEaFVbtFMuy+8/uDSI/zcfKA/WrgjAQmCYLXmS7MajdeC+e6 pFMXt1FBWX/tsU2ZLywQDy6/LfpioC15JQR9cmKRseTp6ekQmy14LylrQ96794mF9BsK gC7080/E6KSdji1TqQaLvfNsN5b22vur/bkHWKgJESHJj08iKWBrlnyzmJxpD1DEiMTu 6w==
Received: from iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta03.appoci.oracle.com [130.35.103.27]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 3mtcya1c80-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Sun, 01 Jan 2023 17:13:06 +0000
Received: from pps.filterd (iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (8.17.1.5/8.17.1.5) with ESMTP id 301F0BZQ019488; Sun, 1 Jan 2023 17:13:04 GMT
Received: from nam12-mw2-obe.outbound.protection.outlook.com (mail-mw2nam12lp2045.outbound.protection.outlook.com [104.47.66.45]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 3mtbh2y22s-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Sun, 01 Jan 2023 17:13:04 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=dansdF64x9iW54+I20mkMvJ3Yum+QHtW8FQb4WqEv9tuyTSKFsV88ncUy9z4ZAbGUfgt2+kLvmumvxWLuWtwcOUETJyqoJ/5mLeH2yGHRS4zwy0QRmsk+ZA7dUJmCA++1neeF7zrcOAv2z/ldYlXL63hcZqwXH8ntyfj7ZDFl1PL/YM4/apcZJzm3PmGej/nagDSMfimDPDOGaR9JL9hcK89rXFcmtT+iknN1y9tmfWJIKYkg8hh0GYBBkO10JbuNua6nXncHYl/5p8LC2EN5BYN8jocjlddTBAiljkXuVlZT/+SZhO8WxHvkKzl+yxi+DAVCSkvSVl97o37xLAFYw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=104fWbqfCF7LiLYmFOduIjW04o06QjxMS3ksnxfhRk0=; b=ngpPXCIlkQjS3SNomQ4nZYxfW4Vo5hd99Ca0JThfq1DFi/K7GjUtHsRwtLaWN4Gk41skYM9xM8fne6d/DTW/GLNt5q3QyZ5Cb1fBYQNZnEMpwH0wm/9vBE1gJcVXCXHw3rNE30QjYkwBrYknf18m9mL5QON/TbqIxZd/UrFnNCdeUk9z/wGdW8MZeYW08yncufUjEEkyeNN6QIAja1aZHU7KvsTbmQ2sxEDeA65ykViIwQQfY/CmwExQLPOxgyD05MpuklcTm29PVwFCVrXD6D75xaBmtpuAcnyGV8PPXyx3vdu7yLjMs/5sQL7MsY8rkM8R/9u70MgPQOulUKPTjQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=104fWbqfCF7LiLYmFOduIjW04o06QjxMS3ksnxfhRk0=; b=tmXDqjBLcTb3TL9hCzUvly5AfD+JgNXWWMDie5hjidN9FhUASXHjpkgrpxRiA09E1c6MefLU67acS+SvlDeVomICWr1cLBW46OYssb1CMZ8Jy0Cv6X9sM7FZ18QEEg1WCqA3IXCFCrIfjT6xx3UPacucZBo5AFIFJ/iQYhJLGpo=
Received: from BN0PR10MB5128.namprd10.prod.outlook.com (2603:10b6:408:117::24) by PH0PR10MB4550.namprd10.prod.outlook.com (2603:10b6:510:34::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5944.19; Sun, 1 Jan 2023 17:12:57 +0000
Received: from BN0PR10MB5128.namprd10.prod.outlook.com ([fe80::d8a4:336a:21e:40d9]) by BN0PR10MB5128.namprd10.prod.outlook.com ([fe80::d8a4:336a:21e:40d9%4]) with mapi id 15.20.5944.019; Sun, 1 Jan 2023 17:12:56 +0000
From: Chuck Lever III <chuck.lever@oracle.com>
To: Rick Macklem <rick.macklem@gmail.com>
CC: "nfsv4@ietf.org" <nfsv4@ietf.org>
Thread-Topic: [nfsv4] RFC: Combining RPC-with-TLS and sec=krb5
Thread-Index: AQHZHddiw7nDaLKYF0+6uoKN1jkobq6JzOSA
Date: Sun, 01 Jan 2023 17:12:56 +0000
Message-ID: <C3FF2629-C824-4772-AE48-73395EBE7BC9@oracle.com>
References: <CAM5tNy7A41ss3m_Q4+XSnUF3frbe9YO-4EzMUA1_k_wyz+e12Q@mail.gmail.com>
In-Reply-To: <CAM5tNy7A41ss3m_Q4+XSnUF3frbe9YO-4EzMUA1_k_wyz+e12Q@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3696.120.41.1.1)
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN0PR10MB5128:EE_|PH0PR10MB4550:EE_
x-ms-office365-filtering-correlation-id: c189216a-7da0-433c-3a75-08daec1b6d24
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN0PR10MB5128.namprd10.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(366004)(39860400002)(396003)(376002)(136003)(346002)(451199015)(41300700001)(8936002)(4326008)(66946007)(8676002)(76116006)(91956017)(5660300002)(316002)(64756008)(2906002)(6916009)(66899015)(6486002)(6506007)(53546011)(71200400001)(66446008)(66556008)(478600001)(66476007)(2616005)(86362001)(26005)(186003)(6512007)(83380400001)(122000001)(38100700002)(36756003)(38070700005)(33656002)(22166003)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="us-ascii"
Content-ID: <C1862CA72DCD204B90256E3A1C0E50AE@namprd10.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN0PR10MB5128.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c189216a-7da0-433c-3a75-08daec1b6d24
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Jan 2023 17:12:56.5085 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: kX9MpjBB+LydljUrGWxo1MYoPs36bKFtLISA8xcyJXdNP04GJVNEi2iAcXkSgfEuhInXU3mrNWuyDg9oHyucew==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR10MB4550
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.923,Hydra:6.0.545,FMLib:17.11.122.1 definitions=2023-01-01_07,2022-12-30_01,2022-06-22_01
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxlogscore=999 bulkscore=0 suspectscore=0 malwarescore=0 mlxscore=0 spamscore=0 adultscore=0 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2212070000 definitions=main-2301010158
X-Proofpoint-ORIG-GUID: qc5Ccpymr470V1xFumdphYXXD596szki
X-Proofpoint-GUID: qc5Ccpymr470V1xFumdphYXXD596szki
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/HCEEyCj58dcdlVZ-cxCxhxVcAVk>
Subject: Re: [nfsv4] RFC: Combining RPC-with-TLS and sec=krb5
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 01 Jan 2023 17:13:14 -0000

Happy new year, Rick.

> On Dec 31, 2022, at 6:46 PM, Rick Macklem <rick.macklem@gmail.com> wrote:
> 
> First, some background...
> 
> The NFSv4 RFCs require that the same principal be used for all state
> related operations as was used for the initial SetClientID or ExchangeID.
> For kerberized NFSv4 mounts, the client has typically handled this in one
> of two ways:
> 
> A - A host based principal of the form "host/FQDN-of-client" is created
>     on the KDC.  A keytab entry for this principal is then generated and
>     put in the client's default keytab file via some secure means.
>     This approach works, but does have some limitations:
>     - The client must have a well defined, fixed, DNS host name.
>       This implies that it does not work for any mobile device.

My impression is that there are similar DNS-related constraints on the
usage of x.509 certificates for peer authentication.


>     - The administrative overhead of doing this seems to have discouraged
>       some from doing Kerberized NFSv4 mounts and instead choosing to
>       use insecure AUTH_SYS.
> 
> B - The client's "root" user does a kinit for a Kerberos user principal
>     to acquire a valid TGT and then does a mount, using that TGT/principal.
>     This approach works, but also has limitations:
>     - When the user principal's TGT expires, the mount stops working.
>     - The mount can only be done manually, after doing a "kinit".
>     - The procedure for doing this is rather convoluted for the Linux
>       NFSv4 client.
> 
> The fact that this tends to be administratively "awkward" is not
> surprising, since Kerberos was designed for user authentication
> and not machine (or peer, if you prefer) authentication.
> We now have RPC-with-TLS.  This can provide machine authentication,
> but requiring the NFSv4 client to present a valid X.509 certificate
> during TLS handshake.  It also provides on-the-wire encryption,
> obviating any need for RPCSEC_GSS integrity or privacy.
> However, it does not provide user authentication and, as such, can
> result in mounts using insecure AUTH_SYS.
> 
> So, what I have test coded for FreeBSD combines the use of RPC-with-TLS
> for privacy and machine authentication with the use of RPCSEC_GSS/Kerberos
> for user authentication.  This did not require any on-the-wire protocol
> changes, but did require some implementation work on both client and server.

This is the basic convention that I had roughly envisioned when working
on RPC-with-TLS, as it plays to the strengths of both security mechanisms.
It does not address the issue of having to place identification material
on every participating client (ie, a keytab, PSK, or x.509 certificate),
but the other benefits are palpable.

The security policy details have to be worked out, of course. I suspect
a channel binding type will need to be specified, for example.


> For the NFSv4 server:
> 1 - Allow compound RPCs that consist entirely of state maintenance operations
>     (ExchangeID, CreateSession, ReclaimComplete, Sequence, DestroySession,
>      DestroyClient, SetClientID, SetClientIDConfirm, Renew, FreeStateID,
>      ReleaseLockOwner, BindConnectionToSession)
>     to be performed using AUTH_SYS credentials with the same uid (usually 0)
>     if the client is using RPC-with-TLS and has machine authenticated during
>     TLS handshake (via a X.509 certificate).
> 2 - Require all other compound RPCs (ones making use of a CFH) to be performed
>     with RPCSEC_GSS/Kerberos credentials.
> This turned out to be fairly simple for the FreeBSD NFSv4 server, since it
> already had a separate function to authenticate #1 vs #2 RPCs.
> 
> This allows a client to use Kerberos for user authentication, but does not
> require the client to do (A) or (B) above.
> Implementation of this in the FreeBSD NFSv4 client turned out to be somewhat
> more involved than the server changes.  The FreeBSD NFSv4 client does a
> compound RPC that looks like:
> - PutRootFH, { Lookup, Lookup,...Lookup }, GetFH
>   For example, if the mount is specified as nfsv4-server:/export/vol1,
>   the above would be:
>   PutRootFH, Lookup export, Lookup vol1, GetFH
> This RPC is normally done during mount.  To make this scheme work, the
> above RPC needed to be deferred if the server replied NFS4ERR_WRONGSEC
> when attempted using AUTH_SYS credentials.
> Then, the above RPC is attempted again whenever a user process attempts
> to access the mounted file system.  When one of these access attempts
> is done by a user with a valid TGT for their user principal, the attempt
> succeeds and the mount then knows the actual file handle for the
> mount point.
> 
> Deferring acquisition of the mount point file handle required that a "fake"
> one be created during the mount operation, which is then replaced when
> a retry of the above RPC succeeds.  This is obviously a FreeBSD specific
> implementation detail, but other clients might perform in a similar way.
> 
> In summary, this implementation allows the use of Kerberos for user
> authentication without the need to (mis)use Kerberos for machine authentication.
> Machine authentication is handled by RPC-with-TLS, along with on-the-wire
> encryption (which may be supported by offload hardware).
> It is hoped that this might simplify Kerberos deployment for NFSv4 mounts
> to the point that it would be more widely adopted.
> 
> So, does this sound like a good plan?
> 
> In particular, are the Linux folk interested in implementing this?

A better place to ask this last question is linux-nfs@vger.kernel.org,
Cc: the Linux NFS client architect/ maintainers (Trond and Anna). In
general, the Linux NFS server implementation will follow whatever the
Linux NFS client needs it to, so the client maintainers need to speak
up about what they find acceptable.


--
Chuck Lever