Re: [nfsv4] I-D Action: draft-ietf-nfsv4-rpc-tls-01.txt

David Noveck <davenoveck@gmail.com> Tue, 23 April 2019 14:46 UTC

Return-Path: <davenoveck@gmail.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5FD18120385 for <nfsv4@ietfa.amsl.com>; Tue, 23 Apr 2019 07:46:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W5UFIhygVQY5 for <nfsv4@ietfa.amsl.com>; Tue, 23 Apr 2019 07:46:27 -0700 (PDT)
Received: from mail-ot1-x341.google.com (mail-ot1-x341.google.com [IPv6:2607:f8b0:4864:20::341]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 78E19120364 for <nfsv4@ietf.org>; Tue, 23 Apr 2019 07:46:27 -0700 (PDT)
Received: by mail-ot1-x341.google.com with SMTP id m10so13060125otp.2 for <nfsv4@ietf.org>; Tue, 23 Apr 2019 07:46:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Db4frkcg/yB1YRAhsEdRG0WNUqP5eJpSlAbm5gUHKv4=; b=MK7Y12tAoiaD+3WuD1IjfX2L1ttQS70y0+YIgDoWAYPBH2DDxufa6BQESz0/xdUR3U 5tGbBLODNm7fXX73Ou4KmXwb5j+yT/04vMzEruxI0lJy95dR2noSt7CvyCVjIKHaZCm1 XG+Z1QCcCulgAqHCkgshp/rxSVs24OymOtcXy9n6IUYPaedXLSvXkvPW56Sw6AEOiF8w nUEH1jM5AUBRc2pzs8rjXGDZ150iYD9CA9MCGxmlmVjOItANJfwBIxVBXIercBmlRsD6 n8NsEtSlxVOdGXDlM46shOl/XDIfnU5dk+KAoOCXgCecw4lvK54K9aDIxywKKAtLWGWi UcTA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Db4frkcg/yB1YRAhsEdRG0WNUqP5eJpSlAbm5gUHKv4=; b=mIX8Yjgtf9DAGdMO5bHgvXzGAlFsx7q189/WztLROUTXsOMzOacOuzyTxh32H27Z/q aI/jtLB0L16eMqrMW0v5HeXqhJ/uVgoupjmmjnBg7DhQOFuNWeAtkX0gzgCO0aAvoC5p FrYgAGSlaIPNOgum2GZ7qy6cAw3SCjFMl04jPDTs6hMny2UfdTtqmS6dY9Tf4vvjVXDX 67a43zQHUNMT3kGAmzlCjIMEizTQJe7+TZHCytS/pogr6cFnVC3R4FVP3aBbi3cnBckw tCpoAG2QGpUD/tuOfjsJEG3Cxhof4KIzCkUa7z9OKw07L08bFYyMmLfRojDUKxV316hZ Bb8Q==
X-Gm-Message-State: APjAAAWq5pyd9hq4PWLFD8p3jVp5iVc+/XJu7/emN0DNAc0DRaqQVFyp NtB9HZvIHefiJhEMKCOVgT5OmR6QHM0Ajtxbyfs=
X-Google-Smtp-Source: APXvYqwBUDr4/ECknytl3N10uFBRr2h8R966h6sFX9OTlPAKRVzNQztavqRnpe59jAeDx6rqZlOyP9wEP6Bq3Li6+wg=
X-Received: by 2002:a9d:7b50:: with SMTP id f16mr15358128oto.221.1556030786562; Tue, 23 Apr 2019 07:46:26 -0700 (PDT)
MIME-Version: 1.0
References: <155535049832.10773.1565621811584007627@ietfa.amsl.com> <CADaq8jcCB9g9v=h4iXu1f6=cAsU7wMdmfh31gCQKvEFw2eG=rA@mail.gmail.com> <804CB622-D696-4FAA-8040-993CB4029508@oracle.com> <20190422154814.GH72232@kduck.mit.edu> <1675709053.1664834.1556009043904.JavaMail.zimbra@desy.de> <CAN-5tyEQA_XiWW7Ry3SfHQYN46cdoSgUqKT3wx6YLn1t9PB18w@mail.gmail.com>
In-Reply-To: <CAN-5tyEQA_XiWW7Ry3SfHQYN46cdoSgUqKT3wx6YLn1t9PB18w@mail.gmail.com>
From: David Noveck <davenoveck@gmail.com>
Date: Tue, 23 Apr 2019 10:46:15 -0400
Message-ID: <CADaq8jcs8esWjkAeiZFULp0wZ_DqQh54KcMJ3=BMnXjsTYHo2g@mail.gmail.com>
To: Olga Kornievskaia <aglo@umich.edu>
Cc: "Mkrtchyan, Tigran" <tigran.mkrtchyan@desy.de>, NFSv4 <nfsv4@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000004af150058733a60b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/LBQOpRMs1DuZpjGsFgr2-PPHQ4E>
Subject: Re: [nfsv4] I-D Action: draft-ietf-nfsv4-rpc-tls-01.txt
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Apr 2019 14:46:29 -0000

Yes the mount will fail as you describe, but, in that case, the error would
be first detected when you try to access the krb5-only fs.   In the case
Tigran
is mentioning,  the server is interested in preventing unencrypted access
from
the beginning.

This can be an issue in liight of the fact that there is no way (without
rpc-tls)
to cause such operations as EXCHANGE_ID and CREATE_SESSION to be
done with privacy protection.   Also, if the server supports AUTH_SYS at
all,
I think it has to accept it for these operations (again no privacy).  The
problem
that this  leads to is that the clientid and sessionid are the kind of
protocol artifacts that RFC7258 warns us against making observable.   In
the
case of NFSv4.1 they can be the basis of denial of service attacks in that
once the COMPOUND is accepted (easy if AUTH_SYS is supported by
the server at all; not much more difficult in the RPCSEC GSS case since only
a single user needs to be compromised), spurious COMPOUNDs can be
issued so that a legitamate client will have its requests rejected since
they apear
to have invalid slot sequence values :-(.
requests


On Tue, Apr 23, 2019 at 9:42 AM Olga Kornievskaia <aglo@umich.edu> wrote:

> On Tue, Apr 23, 2019 at 4:44 AM Mkrtchyan, Tigran
> <tigran.mkrtchyan@desy.de> wrote:
> >
> >
> >
> > The other aspect that probably makes sense to describe is the behavior
> > when server insist on TLS, some thing like that only operation NULL
> > is accepted and anything else fails with error AUTH_TOOWEAK or similar.
> > In general, the point is not to enforce one or an other way, but clearly
> > specify the client/server interaction to avoid ambiguity for
> implementors.
> > IOW, pure egoism :)
>
> Isn't this already taken care of by the NFS layer. Say my server is
> exporting only krb5 flavors and my client mounts with sec=sys, I will
> get a ERR_WRONGSEC back and mount would fail.
>
> >
> > Tigran.
> >
> > ----- Original Message -----
> > > From: "Benjamin Kaduk" <kaduk@mit.edu>
> > > To: "Chuck Lever" <chuck.lever@oracle.com>
> > > Cc: "NFSv4" <nfsv4@ietf.org>
> > > Sent: Monday, April 22, 2019 5:48:15 PM
> > > Subject: Re: [nfsv4] I-D Action: draft-ietf-nfsv4-rpc-tls-01.txt
> >
> > > On Tue, Apr 16, 2019 at 01:11:54PM -0400, Chuck Lever wrote:
> > >>
> > >> > On Apr 16, 2019, at 1:09 PM, David Noveck <davenoveck@gmail.com>
> wrote:
> > >> >
> > >> > I'm confused by the addition of the word "opportunistically" in the
> abstract.
> > >> > This document defines an important way of providing security to
> RPC-based
> > >> > protocols such as NFSv4, so as to deal with the very real security
> problemms
> > >> > that these protocols have.    While these facilities can only be
> used when both
> > >> > client and the server provides support, I don't think that fact
> alone make the
> > >> > use of these facilties "opportunistic".    What exactlty is this
> word intended
> > >> > to imply?
> > >>
> > >> "Opportunistic" is a term of art. See:
> > >>
> > >> https://en.wikipedia.org/wiki/Opportunistic_TLS
> > >
> > > RFC 7435 is also a good reference for this topic (and one that has IETF
> > > consensus, FWIW).
> > >
> > > The summary of the reasoning for the use of this term is basically
> that it
> > > does not provide protection in the face of an *active* attacker (that
> can
> > > force downgrade to the previous/insecure technology), but does protect
> > > against passive observation.
> > >
> > > -Ben
> > >
> > > _______________________________________________
> > > nfsv4 mailing list
> > > nfsv4@ietf.org
> > > https://www.ietf.org/mailman/listinfo/nfsv4
> >
> > _______________________________________________
> > nfsv4 mailing list
> > nfsv4@ietf.org
> > https://www.ietf.org/mailman/listinfo/nfsv4
>
> _______________________________________________
> nfsv4 mailing list
> nfsv4@ietf.org
> https://www.ietf.org/mailman/listinfo/nfsv4
>