Re: [nfsv4] Path forward for flex-files

Benjamin Kaduk <kaduk@mit.edu> Mon, 07 August 2017 23:52 UTC

Return-Path: <kaduk@mit.edu>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A03C6120720 for <nfsv4@ietfa.amsl.com>; Mon, 7 Aug 2017 16:52:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0kmtM1yvbnZK for <nfsv4@ietfa.amsl.com>; Mon, 7 Aug 2017 16:52:35 -0700 (PDT)
Received: from dmz-mailsec-scanner-6.mit.edu (dmz-mailsec-scanner-6.mit.edu [18.7.68.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A82711201F8 for <nfsv4@ietf.org>; Mon, 7 Aug 2017 16:52:35 -0700 (PDT)
X-AuditID: 12074423-975ff70000002362-39-5988fd4281d8
Received: from mailhub-auth-4.mit.edu ( [18.7.62.39]) (using TLS with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by dmz-mailsec-scanner-6.mit.edu (Symantec Messaging Gateway) with SMTP id 54.AF.09058.24DF8895; Mon, 7 Aug 2017 19:52:34 -0400 (EDT)
Received: from outgoing.mit.edu (OUTGOING-AUTH-1.MIT.EDU [18.9.28.11]) by mailhub-auth-4.mit.edu (8.13.8/8.9.2) with ESMTP id v77NqX1P004458; Mon, 7 Aug 2017 19:52:34 -0400
Received: from kduck.kaduk.org (24-107-191-124.dhcp.stls.mo.charter.com [24.107.191.124]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.13.8/8.12.4) with ESMTP id v77NqUcP000587 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Mon, 7 Aug 2017 19:52:32 -0400
Date: Mon, 07 Aug 2017 18:52:30 -0500
From: Benjamin Kaduk <kaduk@mit.edu>
To: David Noveck <davenoveck@gmail.com>
Cc: Tom Haynes <loghyr@primarydata.com>, "nfsv4@ietf.org" <nfsv4@ietf.org>
Message-ID: <20170807235229.GL70977@kduck.kaduk.org>
References: <CADaq8je82zvas0iAK+sSFzQ29g4pnYOVtqEpUaLpar7WdJxA6Q@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <CADaq8je82zvas0iAK+sSFzQ29g4pnYOVtqEpUaLpar7WdJxA6Q@mail.gmail.com>
User-Agent: Mutt/1.8.3 (2017-05-23)
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFmpjleLIzCtJLcpLzFFi42IRYrdT13X62xFpMGeyhsXZqd/YLZbv2cpu Mfv9I1YHZo+ds+6yeyxZ8pPJY/5cuQDmKC6blNSczLLUIn27BK6Mebv+shZMUaqYcKKNvYHx hVQXIyeHhICJxLsdJ1m6GLk4hAQWM0nMf/aBHcLZwChx/MMTZgjnCpPEmm9X2EBaWARUJF4u mMECYrMB2Q3dl5lBbBEBdYkfD5rAapgFvCQ+z70LFhcWMJDYd3w/WJwXaF3jkw6wXiGBAIln m64xQsQFJU7OfMIC0aslcePfS6YuRg4gW1pi+T8OkDCnQKDEtLMz2EFsUQFliXn7VrFNYBSY haR7FpLuWQjdCxiZVzHKpuRW6eYmZuYUpybrFicn5uWlFuma6eVmluilppRuYgQHrovyDsaX fd6HGAU4GJV4eBkyOyKFWBPLiitzDzFKcjApifJybgEK8SXlp1RmJBZnxBeV5qQWH2KU4GBW EuG98wsox5uSWFmVWpQPk5LmYFES5xXXaIwQEkhPLEnNTk0tSC2CycpwcChJ8Br8AWoULEpN T61Iy8wpQUgzcXCCDOcBGv76N8jw4oLE3OLMdIj8KUZjjo79e74wcXTM+PmNSYglLz8vVUqc dw1IqQBIaUZpHtw0UPKRyN5f84pRHOg5YV5PkKU8wMQFN+8V0ComoFVvEltBVpUkIqSkGhhD D+vEmuX9Peao6CxzW+HnfM9lrJer4/6meJTMtYmb6n/I4fPtL/Mnib94pdu26Ohd3USJJTss 4qxrvGNUH+V69Exhq0+oXqE7uWL9jZ8Zi7uil7wp4DgTOvfGIssr/EZrbgbfvSu93LqUebqV ruKfRc3l8j+5jzfM/2Ljs5xXRc30yDEW/1YlluKMREMt5qLiRAA+97uPGQMAAA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/HlWsGNugFyqqtVCNLzn5laDTduM>
Subject: Re: [nfsv4] Path forward for flex-files
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Aug 2017 23:52:38 -0000

On Sat, Aug 05, 2017 at 09:18:50AM -0400, David Noveck wrote:
> I've been holding off on doing a detailed review of flex-files-12 since Tom
> has previously indicated there would be -13.
> 
> I've been following the discussion of the details of loose-coupling
> security, but my lack of understanding of Kerberos meant
> that most of the discussion went over my head.  However, I think it is
> pretty clear that if Olga doesn't think the approach in -12
> will work and Tom agrees, then it won't work and I'm glad we are moving
> on.  I don't think that the deletion of RPCSEC_GSS

I also agree with Olga and Tom -- there just isn't the proper (opaque)
hole in which to stuff the needed data, and the XDR is already in the wild.

If one was super-desparate, one could imagine running a separate service
on the MDS that maintained a database of synthetic uid/gid against the
GSS entity that's authorized to access that file, and issues the synthetic
GSS credentials.  But that doesn't really help us here, since there would
need to be a whole separate protocol specified for this separate service,
all entities would need to know it's in use, etc..  It doesn't seem worth
trying to graft properl RPCSEC_GSS support onto flex-files within the
constraints of the current XDR; I'm sorry I didn't notice that in my
earlier review, and thanks to Olga for pointing it out.

> support for loose-coupling will be an issue for the IESG, since there is
> support for this when used with tight couplling.
> 
> I'd like to see this document and layout-types go forward in the near
> future and my initial comments will focused on making
> sure that that happens.  Later I'll discuss the issues with regard to the
> future work that Tom is thinking about.
> 
> As I understand things, -13 will include the changes that Chuck has
> suggested to tie this document more closely to layout-types
> and I think that's a good thing. When that change is made, it will need to
> address the fact that these two documents define the
> term "control protocol" differently, although there probably aren't
> differences in actual usage to address.
> 
> As far as I am concerned, there is no need for another WGLC cycle for
> layout-types-06, although Chuck (or others) might feel differently.
> 
> If we consider the longer-term perspective including the work Tom has
> discussed, it seems to be that we have to decide on
> how to divide the following items into RFCs:
> 
>    1. The definition of the XDR for the initial flex-files layout type
>    (currently FLEX_FILES but I think FLEX_FILES_v1 should be considered) along
>    with registration request for it.
>    2. The registration request for the follow-on layout type, FLEX_FILES_v2
>    (I briefly considered FLEXIER_FILES but somhow, sanity returned :-).  This

Can I suggest putting in a typed opaque auth blob instead of explicit
synthetic uid/gid fields?  Then if someone actually wants to implement
one of these crazy loosely-coupled RPCSEC_GSS schemes (Rick's seems like
it would work fine, and I had a couple as well), they can write a spec
and allocate a new type to use for it.

>    one would not have an explicit RFC # but I believe that there is a way
>    around that to create some sort of early registration with an RFC to be
>    named later.
>    3. The XDR corresponding to the follow-on layout type.
>    4. The framework allowing co-operation between MDS and client to
>    implement RPCSEC_GSS for loose coupling.  I expect this would allow use of
>    RPCSEC_GSSV3 but see no need to say  so explicitly.

Er, right, that.

>    5. The actual coordination scheme that Tom wants to standardize.
> 
> If this organization of the work does not make sense or is missing
> something, please let me know.
> 
> I anticipate that the initial flex-files RFC would include 1) and 2).
> 
> The reasons that I don't want to include 3) are:
> 
>    - 3) doesn't make much sense without 4) and adding 4) would push the RFC
>    off a while.
>    - There's a small possibility further XDR issues will arise so we might
>    as well avoid committing to a specific XDR until we have to.
> 
> It might make sense to do 3), 4) and 5) together but Tom might want to
> divide these into multiple RFCs.

I have no particular preference on that.

-Ben