Re: [nfsv4] Agenda items for virtual interim
Chuck Lever III <chuck.lever@oracle.com> Sun, 17 October 2021 04:43 UTC
Return-Path: <chuck.lever@oracle.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EC9353A11DE for <nfsv4@ietfa.amsl.com>; Sat, 16 Oct 2021 21:43:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_BL=0.001, RCVD_IN_MSPIKE_L3=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=oracle.com header.b=KK30zozT; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.b=g8GBhdnj
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MUPHDOjbfJ-S for <nfsv4@ietfa.amsl.com>; Sat, 16 Oct 2021 21:42:56 -0700 (PDT)
Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BF0DA3A11D8 for <nfsv4@ietf.org>; Sat, 16 Oct 2021 21:42:56 -0700 (PDT)
Received: from pps.filterd (m0246617.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 19GNHQ6l014135; Sun, 17 Oct 2021 04:42:54 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=corp-2021-07-09; bh=XXL9eecdp922vkt5SV4F2L6ICL7b807f047KiQyk85Y=; b=KK30zozTK4AhhgpoS/Et86ZxFM/iI48iS6cjWkrApjzn6yqQoLsTmHztq8+cZWM6myon fW+y5Q5hGdRt98FvpjVqgm+QA6kACJckyeaT4yss0aCe0odRJkP4qIo3spzKWm1Mw82w RExomH5XPXf9tSVfKG1DfwaeR2iQlXMfctsJwd6UA2hklpgDXsKbvguy2hVBfX/g20lO rtXX3qWFAhBt9+YFkQLGCAmz09iqXoe/SOSQOnpjSB709DehGGQ9gY3rCIeMci2yM1FF EAsRZaSZJELGkCwPlCfc0qMncvDMmo2f+lSaJmoxnVGw3of1E+mz09kEsU4pWUbi2Qoa kQ==
Received: from aserp3030.oracle.com (aserp3030.oracle.com [141.146.126.71]) by mx0b-00069f02.pphosted.com with ESMTP id 3bqqmasv9u-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Sun, 17 Oct 2021 04:42:53 +0000
Received: from pps.filterd (aserp3030.oracle.com [127.0.0.1]) by aserp3030.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 19H4eiKs093992; Sun, 17 Oct 2021 04:42:52 GMT
Received: from nam11-dm6-obe.outbound.protection.outlook.com (mail-dm6nam11lp2172.outbound.protection.outlook.com [104.47.57.172]) by aserp3030.oracle.com with ESMTP id 3bqmsbnava-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Sun, 17 Oct 2021 04:42:52 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ESuAn/ixiMICqLxAm0AFXGlr5TOoWQBMRzb6v9WhckZ8ytg07iIsfmaNakbgA240DDR1gZaDJMmEcQ0OIiRcM3EUviRWJDEexC4CCVcIlweMrJrqz+Mr1ksjf35IuhPTzzBqWCOnVX805z5g/2O2zBFOCDkIlCZ+8aibdVS2k5HbUSwqXVtTX85N3VTSLDf6ZPUFKOlWifjIVjy8iC+q7t2wtmG3W2612J8PWrKMZiXid271f8i5V3n7JFgo1UisghL9QrXX86DxGwC2bdvEdMlFimLbADxY71srtC9U3QzE5YjSJkuB1Rf5mHDSyy7VZsyZw0zaiELgaw6y1ZxfJQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=XXL9eecdp922vkt5SV4F2L6ICL7b807f047KiQyk85Y=; b=R2+CKmpTfoUrPNTnI+8URzJbUP6cz6cFpw8v40yRn1eRHvD/ustLi/uAq7X/UrJ4Jp0b/BUR5ePBRm70cYXPOVzaUnToqVqjOnz5QYn1UTCjfglNAgVFhf7REVrAg7GbyKyEiL/g6Xyza54g7upwb1OqaxeddMVGG3DpFnhX9ueE8MsZMcSg8nND40ZXM0fELPP9LU1T1HP3q3qIjpzKFheorBr4h0Zi9S4YQuoQUJv29KxGNeUcFWfcyLT5tw2jCAYCGq/7okl0PTy2QA0mKtsYcACc3kdrtgxG3gJllj4Sv/ThFfWLrK0xMp1JRipnzNEM3Fg0Tn8PwYQ78vsnYA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=XXL9eecdp922vkt5SV4F2L6ICL7b807f047KiQyk85Y=; b=g8GBhdnjzTRzXXVcLFeQ2I4kSyqY7KGV5FMi/zWtFvD73Rvrxq2+ySj0gUTryQxOyHl0fXN7nBEG8yksijDKoFlB6ysyqTwhiLObkiwJcrvmR+JTLcGol/kZex5g3/rEmZqou8LsTelWN/v57JIslqNo9pyn5tiMPwcFdTWeDk8=
Received: from SJ0PR10MB4688.namprd10.prod.outlook.com (2603:10b6:a03:2db::24) by BYAPR10MB3510.namprd10.prod.outlook.com (2603:10b6:a03:120::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4608.16; Sun, 17 Oct 2021 04:42:50 +0000
Received: from SJ0PR10MB4688.namprd10.prod.outlook.com ([fe80::f4fe:5b4:6bd9:4c5b]) by SJ0PR10MB4688.namprd10.prod.outlook.com ([fe80::f4fe:5b4:6bd9:4c5b%6]) with mapi id 15.20.4608.018; Sun, 17 Oct 2021 04:42:50 +0000
From: Chuck Lever III <chuck.lever@oracle.com>
To: David Noveck <davenoveck@gmail.com>
CC: Tom Talpey <tom@talpey.com>, Tom Haynes <loghyr@gmail.com>, NFSv4 <nfsv4@ietf.org>
Thread-Topic: Agenda items for virtual interim
Thread-Index: AQHXwpGttGFuyxBM60eQzXiEbYfQQKvWI2yAgABUIgCAACYugA==
Date: Sun, 17 Oct 2021 04:42:50 +0000
Message-ID: <FA1E4520-6D01-46DE-8B06-54C9A8CA2492@oracle.com>
References: <CADaq8jd_pcwJrqnFCqnHo7DXxnzc+ZpL28wRUMqkK-3zesc6mg@mail.gmail.com> <7560301C-4C5C-422C-9F55-B4F362AE5BF7@oracle.com> <CADaq8je9MWT5CzLaTYnRgMh5x9+AHL8F78QxJs_YyGSR67F6nQ@mail.gmail.com>
In-Reply-To: <CADaq8je9MWT5CzLaTYnRgMh5x9+AHL8F78QxJs_YyGSR67F6nQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3654.120.0.1.13)
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=oracle.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 30f539ea-d38c-4c6a-9d10-08d991289364
x-ms-traffictypediagnostic: BYAPR10MB3510:
x-microsoft-antispam-prvs: <BYAPR10MB35108BDC595701D010717DB693BB9@BYAPR10MB3510.namprd10.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:7219;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR10MB4688.namprd10.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(508600001)(36756003)(316002)(66946007)(33656002)(38100700002)(122000001)(26005)(2616005)(54906003)(76116006)(38070700005)(4326008)(2906002)(8676002)(66446008)(66476007)(64756008)(6486002)(91956017)(66556008)(5660300002)(8936002)(6512007)(71200400001)(6506007)(186003)(53546011)(83380400001)(6916009)(86362001)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 6mh/yFYqd5+98lDahxS4ELf3jqP5cQi3IzGoPnZirvKah5XCvebqoqh6LNIaFJRda9zsI5nagitQLc7CfNWS1Mi6fCV3K7DUkE9fBBBFhhewd2oe2bV6kYYjAAZ27o60L6Dv0dOMuBxX+rqTWeCcv/OxS58cVVfsYNEIGoP4oGwH0kxFnY+gTqn0zv+SIJ7uD7cOmKMQQv8Y4koIyuadDXux3XDZzvaWc57yPKSsCdXPtSBXVPfOcF3IqM1hu+G8CrwbgK/1Ocb55wKySgdG/l+Fwkd3erF9lA99Ut5nis252Thl4fkSSDYIQzSyvkzU1oQyEMA6Qgx5NDPTHdfMKGSH2i/FUPUsGbe07DvhIo8g3EUfqqtMmM6KoObVcQXMjikLqKSttS53AjCLiAaAL4j6zCECbdxKyhXnYyramfx4bo8wJ3Z0n1AVq6pKUNF83sQZT9GCINaEyGjhIKR0LmspGlkCTaeLFVDqqK0DKemlYrq6XqQ6OjHzdjLYt4C3xGG4sehVHTapP+gmUrzPQtNYCRh4RePrFKtPLFqFz23MHjEcR+4wg2XqWSy/Uz2x0DujlukNBQRsBURJxAQ6Zzy8OcCeO4iBLto8YM2bzDr/SjH0ROYjr7j5Q1O1EQvR7wU/dAZGyyk27DhLG/w/b3qStQRaBvNi2Nv5b2WWGAg3oiovbegi73K1HmOZBSXsiJcL3fjbPXD0q2jO2iQ5KNvLA6uPyd+r/mprqq/qOmyjJwieW8SuKnjidMxz3Zf8GXopmSs2W/LtKVuzlZzyyjlmIgkP3UuXA1EvyaRS7PGVE52in+FWFX1D90hFqMPIKI/yBGGggerkf5dLrAsP7bp+QAoJysEHv0JSlmH3X20rEkj6DNw4VaawubXtKPVF/EExRniF23WL5CSu3fLwf3hlAxN2WzLvdXyQ8rD6wpXcUBJCBPKP75lRaMfTRBcmWYRSK8IP14KrcDfockKRPS6yU3wg9Jb3H8Syui3NxGCmmUeJx8wcyWlMoq1AAnkhY5wAGV6SPuiw9emBtHikh9yicn0tw3OhxfbHWJElk6fdJw68fYewHB+HnK1iZkkPAMXnvpzgli1vgRJGFpWMeghkUTJmsp/MCr6umln8WAa+Sc/FIwzK4GnLFiHa2wrq4jQpvZV3mtq/jQmjMxN77mYWAJwlEDQwDw8gn6sH0c2oDfF29VXz4h36LS6elJEZjJI9WEpm+m603BXkXua2OaB3qpxGBvnU4pFjBAVezJ8cW4K7HRhy669QYF6FV1o+4xSH7LTONKU8f7Sy1W2Gh9V25H7503BrnQcC+SlkR3Ra7LMB6bzweoP1V1QmFyGS
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="us-ascii"
Content-ID: <1F4E853747766444ACF388FED6CB749E@namprd10.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR10MB4688.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 30f539ea-d38c-4c6a-9d10-08d991289364
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Oct 2021 04:42:50.5059 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: TQfRWpkwW+tIUE/GMKQlpQVOgEm6cIfZeWHkusXkUY+hRlTvl4CuYZQhFfxdr1pmrqcz+yNXBpY52PHr/o3JVw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR10MB3510
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10139 signatures=668683
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 adultscore=0 malwarescore=0 phishscore=0 mlxlogscore=999 bulkscore=0 suspectscore=0 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2109230001 definitions=main-2110170032
X-Proofpoint-ORIG-GUID: OIkgK6BEQ4m8wS2qy1NWI9X565O3f8aK
X-Proofpoint-GUID: OIkgK6BEQ4m8wS2qy1NWI9X565O3f8aK
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/MCvDkoKrhMiBwomZ4dG9NR6JAAI>
Subject: Re: [nfsv4] Agenda items for virtual interim
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 17 Oct 2021 04:43:01 -0000
> On Oct 16, 2021, at 10:26 PM, David Noveck <davenoveck@gmail.com> wrote: > > On Sat, Oct 16, 2021, 5:25 PM Chuck Lever III <chuck.lever@oracle.com> wrote: > >> > On Oct 16, 2021, at 9:28 AM, David Noveck <davenoveck@gmail.com> wrote: >> > >> > I'd be interested in hearing from Chuck about his thoughts about addressing use of RPC-with-TLS for NFSv3 and how that might or might not interact with the v4 security work now going on. >> >> I haven't had a chance to read nfsv4-security yet. That is at >> the top of my to-do list. > > It's 118 pages so it would be best to start soon. I browsed the document this evening to get a head start. Clearly this is a lot of work. Thanks for taking it on. I have some initial impressions, and I might probably have more to say once I'm more awake. ---- After months of me stating very clearly that the term to use is "RPC-with-TLS" and not "RPC-over-TLS" precisely because people were confusing RPC-over-TLS with an actual transport, you have constructed a novel "transport-based security model" with RPC-over-TLS at its core, essentially building on the exact confusion that I have been trying to steer us around. For example, from Section 3.2: The protection of state data from unauthorized modification is discussed in Section 11) is the same in all minor versions together with the identification/ authentication infrastructure supporting it (discussed in Section 13) provided by secure transports such as RPC-over-TLS. RPC-over-TLS no longer exists because we specified a new security mode, not a new transport -- we use UDP and TCP as the actual network transport service. To wit, RPC-with-TLS does not have its own assigned netid. "Network transport service" is a term that has a pretty widely recognized meaning. To avoid confusion, let's try to stick with that meaning, and keep the security services that might be offered by a network transport service as a separate issue. I see a mix of RPC-with/over-TLS throughout, so I'll assume the mix of terminology is merely an artifact of incomplete editing. However, the conceptual confusion still concerns me because it impacts the document's organization and will have a confusing effect on less-experienced readers. ---- The use of "transport-based security" IMHO is problematic. For one, we have had TI-RPC for many years that has attempted to divide transports into a set of separate functional categories, and it's proven difficult to use, has not been broadly adopted, and has not aged well. The introduction of multiple new authentication flavors to represent connection types or transport feels like a layering violation to me that I'm still trying to get comfortable with. I'd rather not mix transport- and security- negotiation this way until we have a much stronger motivation laid out in this document. (I might have missed it, but that motivation seems to be only implied in the current text). We might find it illuminating to consider alternatives to RPC-with-TLS. IPsec has been suggested, and we already know that some installations deploy NFS only on SSH tunnels. The document might compare and contrast these technologies to help clarify our design motivation. ---- Perhaps it is my own misunderstanding, but I had thought this document was supposed to serve as a Security Considerations section for the NFSv4 standards documents, but it appears that Security Considerations are just a tiny part of this document and the bulk of it appears to specify a bunch of new protocol. IMO it would be more usable for implementers and easier to review as well if this document remained fully Informational and covered just the high-level items such as threat analysis, but then left new and revised protocol to other Normative documents. For instance, I would separate the bulk of the discussion of ACLs and mode bits into a separate document; an additional document would also be appropriate for handling new security negotiation features. Additionally, the new protocol elements need to be driven by threat analysis, which is not yet part of this document, otherwise there is no possible way to demonstrate whether or not the new elements are effective. I realize that the document is in very early stages, and it might already be your intent to follow my suggested organization at a later time. ---- I struggle with the decision described in this text: The definitive description of pNFS security will remain in RFC8881 and its successors (i.e. the rfc5661bis document suite). However, because pNFS security relies heavily on the infrastructure discussed here, it is anticipated that the new treatment of pNFS security will deal with many matters by referencing the overall NFS security document. The security considerations section of rfc5661bis will deal with pNFS security issues. pNFS is unsupported in only one of the existing NFSv4 minor versions. That makes it a common element of the majority of minor versions, and thus to me seems like an appropriate candidate for inclusion in this document. Any general discussion of network file system security applies to protocols that might be adopted as part of a pNFS layout type, and the considerations for those protocols are essentially the same as the ones for NFSv4 itself (at least when NFSv4 is doing I/O operations). Here it seems like an ideal example of leaving the high level approach outlined in this document, and the protocol details placed in another document (such as RFC 5661bis). ---- * The availability of RPC-with-TLS (described in [12]) provides facilities that NFSv4 clients and servers will need to use to provide security for data in flight and mitigate the lack of authentication when AUTH_SYS is used. This text should make clear whether you are referring to peer or user authentication, and that you mean strong (ie cryptographic) authentication throughout the document. ---- This one is more of a nit, but it caught my eye: The pNFS optional feature added in NFSv4.1 has its own security needs which parallel closely those of non-pNFS access but are distinct, especially when the storage access protocol used are not RPC protocols. As a result, these needs and the means to satisfy them are not discussed in this document. First, I suggest starting with "The OPTIONAL pNFS feature added". Second, you refer to storage access protocols that "are not RPC protocols." Is it the use of RPC that is the distinction here, or is it something else? Some storage access protocols might already have sufficient user and peer authentication as well as access to encryption and integrity services, even though they do not use ONC RPC or RPCSEC_GSS. Having a comprehensive threat analysis to refer to would identify exactly what is required of a secure storage access protocol. -- Chuck Lever
- [nfsv4] Agenda items for virtual interim David Noveck
- Re: [nfsv4] Agenda items for virtual interim Chuck Lever III
- Re: [nfsv4] Agenda items for virtual interim Rick Macklem
- Re: [nfsv4] Agenda items for virtual interim David Noveck
- Re: [nfsv4] Agenda items for virtual interim David Noveck
- Re: [nfsv4] Agenda items for virtual interim Chuck Lever III
- Re: [nfsv4] Agenda items for virtual interim David Noveck
- Re: [nfsv4] Agenda items for virtual interim Chuck Lever III
- Re: [nfsv4] Agenda items for virtual interim Chuck Lever III
- Re: [nfsv4] Agenda items for virtual interim Rick Macklem
- Re: [nfsv4] Agenda items for virtual interim David Noveck
- Re: [nfsv4] Agenda items for virtual interim Chuck Lever III
- Re: [nfsv4] Agenda items for virtual interim Chuck Lever III
- Re: [nfsv4] Agenda items for virtual interim Rick Macklem
- Re: [nfsv4] Agenda items for virtual interim David Noveck