Re: [nfsv4] I-D Action: draft-ietf-nfsv4-integrity-measurement-02.txt

Chuck Lever <chucklever@gmail.com> Wed, 10 October 2018 14:48 UTC

Return-Path: <chucklever@gmail.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1B035130EE5 for <nfsv4@ietfa.amsl.com>; Wed, 10 Oct 2018 07:48:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lJo2Jdt5I_Nr for <nfsv4@ietfa.amsl.com>; Wed, 10 Oct 2018 07:48:41 -0700 (PDT)
Received: from mail-it1-x143.google.com (mail-it1-x143.google.com [IPv6:2607:f8b0:4864:20::143]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3E870130DD9 for <nfsv4@ietf.org>; Wed, 10 Oct 2018 07:48:41 -0700 (PDT)
Received: by mail-it1-x143.google.com with SMTP id c85-v6so8364349itd.1 for <nfsv4@ietf.org>; Wed, 10 Oct 2018 07:48:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=AukJDW+VrjanuSHHnnlU6zaj89buUOjKlLD+EwBoggw=; b=GdZVg7g/gJeywmGldmExYQWZemovj5NhCsR81R0W+Oe9KNiy6KQxNWOELQ55aE06qT QiPugD74DAuj6CONiRn/CxKNkvN3AQBd+l6l2BAxP4dWWjBEH2QA2xYbnqw+9VBLuv1s Wow6V2cuTepZ6pBFsUWz1RJXDagzhDT0Qiyf8v0LsYrsh2c+hz1pcDbd1jqWFlGf7+SZ m9KeL0Cl4nQAelFHIYsmo/VGjqAl1+iG7A85yCSRBX94iIALqXURZ4GqPi8slY984Q+H ImQGrxu4l39VSfYqjohUQjyheWcbUp7BNltrZZHZrMWUTYm8A33PBv8SkQFW0lRk1j+Z 0sJA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=AukJDW+VrjanuSHHnnlU6zaj89buUOjKlLD+EwBoggw=; b=N08+6HenChU3tOfrNT8Hrrt2Ag09mFrTIJCucaB2Gnj6ZdsgqRaKmshyH/kRjfnnCs Xl57PfHf9sonMOgZKvTrnkUufCGWZ2j9M38AbQOesiuubL5B1Md0KM63IzcWUn2Ouq1J KbghogeNHkvJWbezKw5DdJ2UJY2MF/zSyrtAiKxx2GXTw+i3OCPPxpuh9wp71XPUbTkV Yq9wFV1/cLMiq2c0y8NuskGQmnwLy7t+Z3Dokz8fzQ9ClXhnQ+/Fe+QMiIkQ9AvH05SA 5GOuNukHhtAdvpYAauTe/4cFJjZZ74duqo0M8tMKmgwEH9vgvBDDZ9eIuVNZLMQLUyRU VxNg==
X-Gm-Message-State: ABuFfogskV7u4vGgLuek1sQcajrElBWP4coJoV+THKimlKVlkIWoLFIR W6MTzqN1p9Ty3ui34jFLGVeUCwlt
X-Google-Smtp-Source: ACcGV61Vk1PFmoz6W0IvUu5soJeK4fy1n/vYBzgALXiBETZraJnDCZCRoiCpZm/D4LdzptdoiPPvKQ==
X-Received: by 2002:a24:d994:: with SMTP id p142-v6mr988030itg.126.1539182920491; Wed, 10 Oct 2018 07:48:40 -0700 (PDT)
Received: from anon-dhcp-171.1015granger.net (c-68-61-232-219.hsd1.mi.comcast.net. [68.61.232.219]) by smtp.gmail.com with ESMTPSA id r202-v6sm7545730iod.28.2018.10.10.07.48.39 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 10 Oct 2018 07:48:39 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
From: Chuck Lever <chucklever@gmail.com>
In-Reply-To: <20181010010604.GE3293@kduck.kaduk.org>
Date: Wed, 10 Oct 2018 10:48:38 -0400
Cc: "Everhart, Craig" <Craig.Everhart@netapp.com>, "nfsv4@ietf.org" <nfsv4@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <F5EA054F-382A-4090-9F1C-55F554109D32@gmail.com>
References: <153901060913.16390.8389561648327812120@ietfa.amsl.com> <23D33FE9-54F9-40CB-AC41-23EC15603E47@netapp.com> <BACFE07D-B843-485F-97EE-4D36ABAB356F@gmail.com> <55FF4CA0-BB68-44F1-AFAC-DD1E0F9443C2@netapp.com> <B89BBD1B-C06B-4694-BB78-8BFE3B04EC36@gmail.com> <080D3CB4-1120-4BA5-9ED1-037589BCB0CF@netapp.com> <0B7D2395-5E79-48CD-ADA1-E80A7C6F2073@gmail.com> <20181010010604.GE3293@kduck.kaduk.org>
To: Benjamin Kaduk <kaduk@MIT.EDU>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/HL49LnV7Yt9BxVDZajtJRWYYCQg>
Subject: Re: [nfsv4] I-D Action: draft-ietf-nfsv4-integrity-measurement-02.txt
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Oct 2018 14:48:43 -0000


> On Oct 9, 2018, at 9:06 PM, Benjamin Kaduk <kaduk@MIT.EDU> wrote:
> 
> On Tue, Oct 09, 2018 at 11:24:13AM -0400, Chuck Lever wrote:
>> 
>> 
>>> On Oct 8, 2018, at 5:17 PM, Everhart, Craig <Craig.Everhart@netapp.com> wrote:
>>> 
>>>   and there would need
>>>   to be a strong guarantee that the network between the server and clients
>>>   is of very high integrity. Perhaps the use of a GSS integrity service
>>>   would be required in such a use case.
>>> 
>>> Why does this impose additional requirements on this OPTIONAL, but otherwise completely opaque, service?  What additional requirements does it levy?  Why wouldn't, for example, it be totally adequate to apply other techniques for recovering incompatibility?  For example, if the provenance information were to include, effectively, a checksum of the content, what is the range of meaningful actions available to the provenance assessor if the file object's checksum were not to match that in the provenance's checksum?
>> 
>> Again, "meaningful actions" are policy to be determined by the provenance
>> assessor. This is a separate, independent security module that is not a
>> part of the storage or file system stack.
>> 
>> If you have any questions about the assessor, have a look at the IMA
>> reference cited at the end of the document, or review the IMA
>> implementation in the Linux kernel.
> 
> I have a question about "the assessor", but it is not about the internals
> of IMA's operation.  In particular, it relates to the usage of the definite
> article.  As Craig has noted upthread, any given NFS server can be serving
> a broad array of clients and datasets, to the extent that it seems
> unreasonable to assume that any given NFS server either only serves
> IMA-capable clients or non-IMA-capable clients.  (That is, not a mix of
> both.)

This is another reason why the server should not prevent remote
access based on failures of its own provenance assessor. But
I begin to see why this should be a policy decision rather than
a specified requirement.


> The situation gets much more complicated if one posits a non-IMA
> implementation of provenance information.  In mixed environments one cannot
> assume that provenance information implies IMA -- for well-behaved
> interoperability there must be some in-protocol indication of which of the
> many potential assessors should receive the information.

As long as FPI is self-describing, I don't see a strong need for
in-protocol indication (a type tag). However, if we believe there
might ultimately be more than one provenance mechanism in effect
at the same time, FPI accessors would need to steer the NFS server
to retrieve the correct flavor of FPI, and to steer tools to store
FPI in the correct location (a particular xattr, for example).

In that case a tag would be valuable, though I still struggle with
the lack of an actual example of a non-IMA provenance assessment
mechanism.


> Also upthread the claim was made that with no specification for IMA or
> other assessors, there cannot be a registry.  I don't think this is
> actually true; e.g., an open registration policy such as expert
> review or FCFS can allow for codepoint allocation for protocols at
> varying levels of specification maturity.  I actually think a registry
> makes the most sense here and would suggest the Expert Review procedure for
> it.

"varying levels of specification maturity" -- OK, that makes it
easier. I will add a 32-bit type tag and request a registry.


--
Chuck Lever
chucklever@gmail.com