Re: [nfsv4] Agenda items for virtual interim

Chuck Lever III <chuck.lever@oracle.com> Sun, 17 October 2021 04:43 UTC

Return-Path: <chuck.lever@oracle.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EC9353A11DE for <nfsv4@ietfa.amsl.com>; Sat, 16 Oct 2021 21:43:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_BL=0.001, RCVD_IN_MSPIKE_L3=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=oracle.com header.b=KK30zozT; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.b=g8GBhdnj
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MUPHDOjbfJ-S for <nfsv4@ietfa.amsl.com>; Sat, 16 Oct 2021 21:42:56 -0700 (PDT)
Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BF0DA3A11D8 for <nfsv4@ietf.org>; Sat, 16 Oct 2021 21:42:56 -0700 (PDT)
Received: from pps.filterd (m0246617.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 19GNHQ6l014135; Sun, 17 Oct 2021 04:42:54 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=corp-2021-07-09; bh=XXL9eecdp922vkt5SV4F2L6ICL7b807f047KiQyk85Y=; b=KK30zozTK4AhhgpoS/Et86ZxFM/iI48iS6cjWkrApjzn6yqQoLsTmHztq8+cZWM6myon fW+y5Q5hGdRt98FvpjVqgm+QA6kACJckyeaT4yss0aCe0odRJkP4qIo3spzKWm1Mw82w RExomH5XPXf9tSVfKG1DfwaeR2iQlXMfctsJwd6UA2hklpgDXsKbvguy2hVBfX/g20lO rtXX3qWFAhBt9+YFkQLGCAmz09iqXoe/SOSQOnpjSB709DehGGQ9gY3rCIeMci2yM1FF EAsRZaSZJELGkCwPlCfc0qMncvDMmo2f+lSaJmoxnVGw3of1E+mz09kEsU4pWUbi2Qoa kQ==
Received: from aserp3030.oracle.com (aserp3030.oracle.com [141.146.126.71]) by mx0b-00069f02.pphosted.com with ESMTP id 3bqqmasv9u-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Sun, 17 Oct 2021 04:42:53 +0000
Received: from pps.filterd (aserp3030.oracle.com [127.0.0.1]) by aserp3030.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 19H4eiKs093992; Sun, 17 Oct 2021 04:42:52 GMT
Received: from nam11-dm6-obe.outbound.protection.outlook.com (mail-dm6nam11lp2172.outbound.protection.outlook.com [104.47.57.172]) by aserp3030.oracle.com with ESMTP id 3bqmsbnava-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Sun, 17 Oct 2021 04:42:52 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ESuAn/ixiMICqLxAm0AFXGlr5TOoWQBMRzb6v9WhckZ8ytg07iIsfmaNakbgA240DDR1gZaDJMmEcQ0OIiRcM3EUviRWJDEexC4CCVcIlweMrJrqz+Mr1ksjf35IuhPTzzBqWCOnVX805z5g/2O2zBFOCDkIlCZ+8aibdVS2k5HbUSwqXVtTX85N3VTSLDf6ZPUFKOlWifjIVjy8iC+q7t2wtmG3W2612J8PWrKMZiXid271f8i5V3n7JFgo1UisghL9QrXX86DxGwC2bdvEdMlFimLbADxY71srtC9U3QzE5YjSJkuB1Rf5mHDSyy7VZsyZw0zaiELgaw6y1ZxfJQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=XXL9eecdp922vkt5SV4F2L6ICL7b807f047KiQyk85Y=; b=R2+CKmpTfoUrPNTnI+8URzJbUP6cz6cFpw8v40yRn1eRHvD/ustLi/uAq7X/UrJ4Jp0b/BUR5ePBRm70cYXPOVzaUnToqVqjOnz5QYn1UTCjfglNAgVFhf7REVrAg7GbyKyEiL/g6Xyza54g7upwb1OqaxeddMVGG3DpFnhX9ueE8MsZMcSg8nND40ZXM0fELPP9LU1T1HP3q3qIjpzKFheorBr4h0Zi9S4YQuoQUJv29KxGNeUcFWfcyLT5tw2jCAYCGq/7okl0PTy2QA0mKtsYcACc3kdrtgxG3gJllj4Sv/ThFfWLrK0xMp1JRipnzNEM3Fg0Tn8PwYQ78vsnYA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=XXL9eecdp922vkt5SV4F2L6ICL7b807f047KiQyk85Y=; b=g8GBhdnjzTRzXXVcLFeQ2I4kSyqY7KGV5FMi/zWtFvD73Rvrxq2+ySj0gUTryQxOyHl0fXN7nBEG8yksijDKoFlB6ysyqTwhiLObkiwJcrvmR+JTLcGol/kZex5g3/rEmZqou8LsTelWN/v57JIslqNo9pyn5tiMPwcFdTWeDk8=
Received: from SJ0PR10MB4688.namprd10.prod.outlook.com (2603:10b6:a03:2db::24) by BYAPR10MB3510.namprd10.prod.outlook.com (2603:10b6:a03:120::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4608.16; Sun, 17 Oct 2021 04:42:50 +0000
Received: from SJ0PR10MB4688.namprd10.prod.outlook.com ([fe80::f4fe:5b4:6bd9:4c5b]) by SJ0PR10MB4688.namprd10.prod.outlook.com ([fe80::f4fe:5b4:6bd9:4c5b%6]) with mapi id 15.20.4608.018; Sun, 17 Oct 2021 04:42:50 +0000
From: Chuck Lever III <chuck.lever@oracle.com>
To: David Noveck <davenoveck@gmail.com>
CC: Tom Talpey <tom@talpey.com>, Tom Haynes <loghyr@gmail.com>, NFSv4 <nfsv4@ietf.org>
Thread-Topic: Agenda items for virtual interim
Thread-Index: AQHXwpGttGFuyxBM60eQzXiEbYfQQKvWI2yAgABUIgCAACYugA==
Date: Sun, 17 Oct 2021 04:42:50 +0000
Message-ID: <FA1E4520-6D01-46DE-8B06-54C9A8CA2492@oracle.com>
References: <CADaq8jd_pcwJrqnFCqnHo7DXxnzc+ZpL28wRUMqkK-3zesc6mg@mail.gmail.com> <7560301C-4C5C-422C-9F55-B4F362AE5BF7@oracle.com> <CADaq8je9MWT5CzLaTYnRgMh5x9+AHL8F78QxJs_YyGSR67F6nQ@mail.gmail.com>
In-Reply-To: <CADaq8je9MWT5CzLaTYnRgMh5x9+AHL8F78QxJs_YyGSR67F6nQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3654.120.0.1.13)
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=oracle.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 30f539ea-d38c-4c6a-9d10-08d991289364
x-ms-traffictypediagnostic: BYAPR10MB3510:
x-microsoft-antispam-prvs: <BYAPR10MB35108BDC595701D010717DB693BB9@BYAPR10MB3510.namprd10.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:7219;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR10MB4688.namprd10.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(508600001)(36756003)(316002)(66946007)(33656002)(38100700002)(122000001)(26005)(2616005)(54906003)(76116006)(38070700005)(4326008)(2906002)(8676002)(66446008)(66476007)(64756008)(6486002)(91956017)(66556008)(5660300002)(8936002)(6512007)(71200400001)(6506007)(186003)(53546011)(83380400001)(6916009)(86362001)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 6mh/yFYqd5+98lDahxS4ELf3jqP5cQi3IzGoPnZirvKah5XCvebqoqh6LNIaFJRda9zsI5nagitQLc7CfNWS1Mi6fCV3K7DUkE9fBBBFhhewd2oe2bV6kYYjAAZ27o60L6Dv0dOMuBxX+rqTWeCcv/OxS58cVVfsYNEIGoP4oGwH0kxFnY+gTqn0zv+SIJ7uD7cOmKMQQv8Y4koIyuadDXux3XDZzvaWc57yPKSsCdXPtSBXVPfOcF3IqM1hu+G8CrwbgK/1Ocb55wKySgdG/l+Fwkd3erF9lA99Ut5nis252Thl4fkSSDYIQzSyvkzU1oQyEMA6Qgx5NDPTHdfMKGSH2i/FUPUsGbe07DvhIo8g3EUfqqtMmM6KoObVcQXMjikLqKSttS53AjCLiAaAL4j6zCECbdxKyhXnYyramfx4bo8wJ3Z0n1AVq6pKUNF83sQZT9GCINaEyGjhIKR0LmspGlkCTaeLFVDqqK0DKemlYrq6XqQ6OjHzdjLYt4C3xGG4sehVHTapP+gmUrzPQtNYCRh4RePrFKtPLFqFz23MHjEcR+4wg2XqWSy/Uz2x0DujlukNBQRsBURJxAQ6Zzy8OcCeO4iBLto8YM2bzDr/SjH0ROYjr7j5Q1O1EQvR7wU/dAZGyyk27DhLG/w/b3qStQRaBvNi2Nv5b2WWGAg3oiovbegi73K1HmOZBSXsiJcL3fjbPXD0q2jO2iQ5KNvLA6uPyd+r/mprqq/qOmyjJwieW8SuKnjidMxz3Zf8GXopmSs2W/LtKVuzlZzyyjlmIgkP3UuXA1EvyaRS7PGVE52in+FWFX1D90hFqMPIKI/yBGGggerkf5dLrAsP7bp+QAoJysEHv0JSlmH3X20rEkj6DNw4VaawubXtKPVF/EExRniF23WL5CSu3fLwf3hlAxN2WzLvdXyQ8rD6wpXcUBJCBPKP75lRaMfTRBcmWYRSK8IP14KrcDfockKRPS6yU3wg9Jb3H8Syui3NxGCmmUeJx8wcyWlMoq1AAnkhY5wAGV6SPuiw9emBtHikh9yicn0tw3OhxfbHWJElk6fdJw68fYewHB+HnK1iZkkPAMXnvpzgli1vgRJGFpWMeghkUTJmsp/MCr6umln8WAa+Sc/FIwzK4GnLFiHa2wrq4jQpvZV3mtq/jQmjMxN77mYWAJwlEDQwDw8gn6sH0c2oDfF29VXz4h36LS6elJEZjJI9WEpm+m603BXkXua2OaB3qpxGBvnU4pFjBAVezJ8cW4K7HRhy669QYF6FV1o+4xSH7LTONKU8f7Sy1W2Gh9V25H7503BrnQcC+SlkR3Ra7LMB6bzweoP1V1QmFyGS
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="us-ascii"
Content-ID: <1F4E853747766444ACF388FED6CB749E@namprd10.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR10MB4688.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 30f539ea-d38c-4c6a-9d10-08d991289364
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Oct 2021 04:42:50.5059 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: TQfRWpkwW+tIUE/GMKQlpQVOgEm6cIfZeWHkusXkUY+hRlTvl4CuYZQhFfxdr1pmrqcz+yNXBpY52PHr/o3JVw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR10MB3510
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10139 signatures=668683
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 adultscore=0 malwarescore=0 phishscore=0 mlxlogscore=999 bulkscore=0 suspectscore=0 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2109230001 definitions=main-2110170032
X-Proofpoint-ORIG-GUID: OIkgK6BEQ4m8wS2qy1NWI9X565O3f8aK
X-Proofpoint-GUID: OIkgK6BEQ4m8wS2qy1NWI9X565O3f8aK
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/MCvDkoKrhMiBwomZ4dG9NR6JAAI>
Subject: Re: [nfsv4] Agenda items for virtual interim
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 17 Oct 2021 04:43:01 -0000

> On Oct 16, 2021, at 10:26 PM, David Noveck <davenoveck@gmail.com> wrote:
> 
> On Sat, Oct 16, 2021, 5:25 PM Chuck Lever III <chuck.lever@oracle.com> wrote:
> 
>> > On Oct 16, 2021, at 9:28 AM, David Noveck <davenoveck@gmail.com> wrote:
>> > 
>> > I'd be interested in hearing from Chuck about his thoughts about addressing use of RPC-with-TLS for NFSv3 and how that might or might not interact with the v4 security work now going on.
>> 
>> I haven't had a chance to read nfsv4-security yet. That is at
>> the top of my to-do list.
> 
> It's 118 pages so it would be best to start soon.

I browsed the document this evening to get a head start.
Clearly this is a lot of work. Thanks for taking it on.

I have some initial impressions, and I might probably
have more to say once I'm more awake.

----

After months of me stating very clearly that the term to
use is "RPC-with-TLS" and not "RPC-over-TLS" precisely
because people were confusing RPC-over-TLS with an actual
transport, you have constructed a novel "transport-based
security model" with RPC-over-TLS at its core, essentially
building on the exact confusion that I have been trying to
steer us around. For example, from Section 3.2:

      The protection of state data from unauthorized modification is
      discussed in Section 11) is the same in all minor versions
      together with the identification/ authentication infrastructure
      supporting it (discussed in Section 13) provided by secure
      transports such as RPC-over-TLS.


RPC-over-TLS no longer exists because we specified a
new security mode, not a new transport -- we use UDP and
TCP as the actual network transport service. To wit,
RPC-with-TLS does not have its own assigned netid.

"Network transport service" is a term that has a pretty
widely recognized meaning. To avoid confusion, let's try
to stick with that meaning, and keep the security services
that might be offered by a network transport service as a
separate issue.

I see a mix of RPC-with/over-TLS throughout, so I'll assume
the mix of terminology is merely an artifact of incomplete
editing. However, the conceptual confusion still concerns
me because it impacts the document's organization and will
have a confusing effect on less-experienced readers.

----

The use of "transport-based security" IMHO is problematic.
For one, we have had TI-RPC for many years that has attempted
to divide transports into a set of separate functional
categories, and it's proven difficult to use, has not
been broadly adopted, and has not aged well.

The introduction of multiple new authentication flavors to
represent connection types or transport feels like a
layering violation to me that I'm still trying to get
comfortable with. I'd rather not mix transport- and security-
negotiation this way until we have a much stronger motivation
laid out in this document. (I might have missed it, but that
motivation seems to be only implied in the current text).

We might find it illuminating to consider alternatives
to RPC-with-TLS. IPsec has been suggested, and we already
know that some installations deploy NFS only on SSH
tunnels. The document might compare and contrast these
technologies to help clarify our design motivation.

----

Perhaps it is my own misunderstanding, but I had thought
this document was supposed to serve as a Security
Considerations section for the NFSv4 standards documents,
but it appears that Security Considerations are just a tiny
part of this document and the bulk of it appears to specify
a bunch of new protocol.

IMO it would be more usable for implementers and easier to
review as well if this document remained fully Informational
and covered just the high-level items such as threat
analysis, but then left new and revised protocol to other
Normative documents.

For instance, I would separate the bulk of the discussion
of ACLs and mode bits into a separate document; an
additional document would also be appropriate for handling
new security negotiation features.

Additionally, the new protocol elements need to be driven
by threat analysis, which is not yet part of this document,
otherwise there is no possible way to demonstrate whether
or not the new elements are effective.

I realize that the document is in very early stages, and
it might already be your intent to follow my suggested
organization at a later time.

----

I struggle with the decision described in this text:

      The definitive description of pNFS security will remain in RFC8881
      and its successors (i.e. the rfc5661bis document suite).  However,
      because pNFS security relies heavily on the infrastructure
      discussed here, it is anticipated that the new treatment of pNFS
      security will deal with many matters by referencing the overall
      NFS security document.

      The security considerations section of rfc5661bis will deal with
      pNFS security issues.

pNFS is unsupported in only one of the existing NFSv4
minor versions. That makes it a common element of the
majority of minor versions, and thus to me seems like an
appropriate candidate for inclusion in this document.

Any general discussion of network file system security
applies to protocols that might be adopted as part of a
pNFS layout type, and the considerations for those
protocols are essentially the same as the ones for NFSv4
itself (at least when NFSv4 is doing I/O operations).

Here it seems like an ideal example of leaving the high
level approach outlined in this document, and the protocol
details placed in another document (such as RFC 5661bis).

----

   *  The availability of RPC-with-TLS (described in [12]) provides
      facilities that NFSv4 clients and servers will need to use to
      provide security for data in flight and mitigate the lack of
      authentication when AUTH_SYS is used.

This text should make clear whether you are referring to peer or
user authentication, and that you mean strong (ie cryptographic)
authentication throughout the document.

----

This one is more of a nit, but it caught my eye:

      The pNFS optional feature added in NFSv4.1 has its own security
      needs which parallel closely those of non-pNFS access but are
      distinct, especially when the storage access protocol used are not
      RPC protocols.  As a result, these needs and the means to satisfy
      them are not discussed in this document.

First, I suggest starting with "The OPTIONAL pNFS feature
added".

Second, you refer to storage access protocols that "are not RPC
protocols." Is it the use of RPC that is the distinction here,
or is it something else? Some storage access protocols might
already have sufficient user and peer authentication as well as
access to encryption and integrity services, even though they
do not use ONC RPC or RPCSEC_GSS.

Having a comprehensive threat analysis to refer to would identify
exactly what is required of a secure storage access protocol.


--
Chuck Lever