Re: [nfsv4] I-D Action: draft-ietf-nfsv4-rpc-tls-01.txt

David Noveck <davenoveck@gmail.com> Wed, 24 April 2019 14:48 UTC

Return-Path: <davenoveck@gmail.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7D7DB120298 for <nfsv4@ietfa.amsl.com>; Wed, 24 Apr 2019 07:48:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RFuBUGLOZwcr for <nfsv4@ietfa.amsl.com>; Wed, 24 Apr 2019 07:48:30 -0700 (PDT)
Received: from mail-ot1-x341.google.com (mail-ot1-x341.google.com [IPv6:2607:f8b0:4864:20::341]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 82999120334 for <nfsv4@ietf.org>; Wed, 24 Apr 2019 07:48:30 -0700 (PDT)
Received: by mail-ot1-x341.google.com with SMTP id t8so16362332otp.7 for <nfsv4@ietf.org>; Wed, 24 Apr 2019 07:48:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=NBnaq5XL+w66I+z2bEmpK1IwJUg0SoUhqITgHFUgtVU=; b=TzrdOIRr4+W6WXeaBhDjJHC9TUdAyC7kw2WmznMunHb3v/q8pGM2wypr7DOutk2bXz Dr1xm6DjQT/U/uLTeSR0hT2/6EJttOm2Md+noyqpftO9hdhKOmI1RB2MUplvlGlIIPvE sUGvr9ifyhWWOtFulLLzrov5o/X9277uQBHINDCbf3xyO0e9LOKPc+9UO68/Lup5eNg4 iDUy3A4WRGhIWKYQWALY6eL696+Ni0ByC4fAj2XYsIg+GmKXAeUJOg5V9puxFYtKf1om I2msvtUXlLaV4/8p/Zn/MSZBAG9dm35Vq5BrItguMuzDgl3LP086YUqHnhSVce3B/mnO +WVA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=NBnaq5XL+w66I+z2bEmpK1IwJUg0SoUhqITgHFUgtVU=; b=XGFFcZt2JujyxhbbCiOxgkegJNYz2M8WHkBC7MrAwRz8TBI8nR500GFLy+WtVdWbbj F54TKM5tLfeB35C5vQuIKJzgnv2ZdtG66KozzvZTpFigLi3SNVrxD7qBFQsEueUL7w7X oADd0b6PMKdKZooxNTUWVWtuPESIlgD4C8aAT/V/s52xNOUWSTdEmeZ9WZXmzmOknSmn xidtLgTqSvcJFADOXAybCg2V1d5Y88T9NmISNmAE4/A0LT20h1HVEYNbwI7ybV6bzb2T O+9Vecl+4toFw0THb+3sVKXD6zu1OlTeoCNnPEHXbX47eAGiOmEpcxHtk0QExDS/vUwt jqpw==
X-Gm-Message-State: APjAAAWlpi+LjzyjM6VsaTW9Hy0ke8IxPpXWHiXwzElrRqQc6YHWqk/j ue7zirs99aQ4w2SzodBdjyUiZCEsa9bQVb4cRQQ=
X-Google-Smtp-Source: APXvYqx+6RmwDdv0rWVWDfLG/3LHXMJZL2hKTx33IXMzJOaVFK8IaJB4z09/M0nSl7Grx5URhclqNQG/RNTVIfckupg=
X-Received: by 2002:a05:6830:1506:: with SMTP id k6mr6694294otp.163.1556117309739; Wed, 24 Apr 2019 07:48:29 -0700 (PDT)
MIME-Version: 1.0
References: <155535049832.10773.1565621811584007627@ietfa.amsl.com> <CADaq8jcCB9g9v=h4iXu1f6=cAsU7wMdmfh31gCQKvEFw2eG=rA@mail.gmail.com> <804CB622-D696-4FAA-8040-993CB4029508@oracle.com> <20190422154814.GH72232@kduck.mit.edu> <2664782D-629E-4AA7-991D-76BAC465686D@oracle.com>
In-Reply-To: <2664782D-629E-4AA7-991D-76BAC465686D@oracle.com>
From: David Noveck <davenoveck@gmail.com>
Date: Wed, 24 Apr 2019 10:48:18 -0400
Message-ID: <CADaq8jciwJanPJ09p95c5WR3QsBcmH6Z6Px4QbkG9_NTfUoJEA@mail.gmail.com>
To: Chuck Lever <chuck.lever@oracle.com>
Cc: Benjamin Kaduk <kaduk@mit.edu>, NFSv4 <nfsv4@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000079d7c9058747cbeb"
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/HPnQQTib0cX5XLweycvoLGsA7-c>
Subject: Re: [nfsv4] I-D Action: draft-ietf-nfsv4-rpc-tls-01.txt
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Apr 2019 14:48:35 -0000

>> The summary of the reasoning for the use of this term is basically that
it
>> does not provide protection in the face of an *active* attacker (that can
>> force downgrade to the previous/insecure technology), but does protect
>> against passive observation.

> Indeed, this looks directly on point.

It does but having read this document and considering Ben's statement
that "it :does not provide protection in the face of an 'active' attacker,
I'm
wondering if the 'opportunistic" nature of this approach should be mentioned
quite as prominently as it is in -01.

For example, Tigran is basically asking for a description of how this
mechanism
would be used non-opprtunistically and it seems clear to me that eventually
there will be a need such deployments.   If and when this mechanism is
widely
deployed the failure to establish an encrypted connection is more likely to
be
due to an active attacker rather than a non-rpc-tls-supporting server.

It is not clear to me why, in that event the client should behave passively
in the
face of an active attack.   As i understand it, an eventual Security
Consideraations
is going to have to consider all possible attacks and we want to avoid a
situation
in which an accurate Security Consideration would need to say, in essence,
"omigod,
it's hopeless". :-(


On Wed, Apr 24, 2019 at 9:53 AM Chuck Lever <chuck.lever@oracle.com> wrote:

>
>
> > On Apr 22, 2019, at 11:48 AM, Benjamin Kaduk <kaduk@mit.edu> wrote:
> >
> > On Tue, Apr 16, 2019 at 01:11:54PM -0400, Chuck Lever wrote:
> >>
> >>> On Apr 16, 2019, at 1:09 PM, David Noveck <davenoveck@gmail.com>
> wrote:
> >>>
> >>> I'm confused by the addition of the word "opportunistically" in the
> abstract.   This document defines an important way of providing security to
> RPC-based protocols such as NFSv4, so as to deal with the very real
> security problemms that these protocols have.    While these facilities can
> only be used when both client and the server provides support, I don't
> think that fact alone make the use of these facilties "opportunistic".
> What exactlty is this word intended to imply?
> >>
> >> "Opportunistic" is a term of art. See:
> >>
> >> https://en.wikipedia.org/wiki/Opportunistic_TLS
> >
> > RFC 7435 is also a good reference for this topic (and one that has IETF
> > consensus, FWIW).
> >
> > The summary of the reasoning for the use of this term is basically that
> it
> > does not provide protection in the face of an *active* attacker (that can
> > force downgrade to the previous/insecure technology), but does protect
> > against passive observation.
>
> Indeed, this looks directly on point.
>
> --
> Chuck Lever
>
>
>
>