[nfsv4] Re: Feedback on user ID for any bis work
Chris Inacio <inacio@cert.org> Fri, 16 August 2024 19:51 UTC
Return-Path: <inacio@cert.org>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C983CC1519A6 for <nfsv4@ietfa.amsl.com>; Fri, 16 Aug 2024 12:51:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.108
X-Spam-Level:
X-Spam-Status: No, score=-7.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cert.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5GI1gX6TFd_s for <nfsv4@ietfa.amsl.com>; Fri, 16 Aug 2024 12:51:12 -0700 (PDT)
Received: from USG02-CY1-obe.outbound.protection.office365.us (mail-cy1usg02on0061.outbound.protection.office365.us [23.103.209.61]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D6390C14F6BA for <nfsv4@ietf.org>; Fri, 16 Aug 2024 12:51:11 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector5401; d=microsoft.com; cv=none; b=LW7PdGOWVnlGxsb/2MUbEeSU1acNydu1CixOPhqOs83lgI8xVUiAXaCg/olGcG5SgoZJx4kW4IGlMVTEuWVW77HULUowcfsk5qMd25tnMbjqh60C3h+rvQUhhje6z3gTYZUMfepvmkr49p8UdA7pog+Bv8I/YMiZ0r00eaamcNd2GkSbznT7+HaeN2/XCXfvgrLaLwrBYmh4oaVgasOTdKnd8m5OvxYa1THmrk/A8+jty+mQQS1i9BepwOTN3XDALfUPoF40O0gA3Pe23zhFlGo0y2rYwvOnJRdGIMzzde/wb5pgf0xGByH6W/TStuPcJ/HVV+cxniSZ7aVFOFavCw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector5401; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=zcLnSOZe8BnbFyoxQ1mFe5rUT6ws/6kjKwgS4/wC7yI=; b=yDsG/teb2m1Zg92AwP4WtCG1zKW5oPY5PEYPaZuqbX2Ub4Zmd7RupEQYWFDgfpqMn1fMYdXG/d68KIzEf1epOZmQYn3MvE0wNNun9LiT/lpUGEzQT1Xxntt6YZAJYQyi/YjKnci8QVabs7Y0lD4qla67Oxeo8sAUBgLepuBDjx8UyWkZXA0M64h6mqwE92PJrQt4JJ4Qqs8AzsVgjPQQ0nwBtBYmaHOxBgwvrE9xu15HJIMsHymQ1huQnIW4f40Xti1/1Vb23mDqJ0yZBr3f+OkwqG0dKMskgebwq5AINopaBGnk9paF12ehPOE9x8b1Qq8s8Ax3DSAGNgdpg9iPVg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cert.org; dmarc=pass action=none header.from=cert.org; dkim=pass header.d=cert.org; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cert.org; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zcLnSOZe8BnbFyoxQ1mFe5rUT6ws/6kjKwgS4/wC7yI=; b=L6rdsDUo68/FEQd9QrLD6QKMIwDSqRkX+IwHXkqMToEmwzAUtoQHtPjO5M2oKeqTNl6D3wOEhYDM9nRf1gZ7tWnNYur9wp4kE+84OFb7GEaugZj6Z4f1dmYMmS5V76Xlgg/iVvkuCpMz3XKkRLK/pW7RfiPYdN4UeYp4gTnO/6E=
Received: from SA1P110MB0975.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:172::5) by SA1P110MB2005.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:1aa::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7828.33; Fri, 16 Aug 2024 19:51:09 +0000
Received: from SA1P110MB0975.NAMP110.PROD.OUTLOOK.COM ([fe80::8aff:57ad:83e3:4567]) by SA1P110MB0975.NAMP110.PROD.OUTLOOK.COM ([fe80::8aff:57ad:83e3:4567%7]) with mapi id 15.20.7828.031; Fri, 16 Aug 2024 19:51:09 +0000
From: Chris Inacio <inacio@cert.org>
To: Rick Macklem <rick.macklem@gmail.com>
Thread-Topic: [nfsv4] Feedback on user ID for any bis work
Thread-Index: AQHa8BWj32x8hnKpnkyfst0JLyud3Q==
Date: Fri, 16 Aug 2024 19:51:09 +0000
Message-ID: <B0F6BCDA-CAE6-4985-AC0D-9DCAAEF68241@cert.org>
References: <88CFBD80-2BAA-43AE-8AA5-C032C2761266@cert.org> <DCD380BF-74D5-4FED-94EA-EC995A9DB164@oracle.com> <CAM5tNy7ELwEbE5z_VMC0ghePcMzkHAcEJDs4skvnxH4XJpeWLA@mail.gmail.com>
In-Reply-To: <CAM5tNy7ELwEbE5z_VMC0ghePcMzkHAcEJDs4skvnxH4XJpeWLA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3776.700.51)
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cert.org;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: SA1P110MB0975:EE_|SA1P110MB2005:EE_
x-ms-office365-filtering-correlation-id: a674c6a2-7ced-486b-2b98-08dcbe2cc64e
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;ARA:13230040|366016|1800799024|4022899009|38070700018;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SA1P110MB0975.NAMP110.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(366016)(1800799024)(4022899009)(38070700018);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <771932244DB2744298997567EBBE14CC@NAMP110.PROD.OUTLOOK.COM>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: cert.org
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SA1P110MB0975.NAMP110.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: a674c6a2-7ced-486b-2b98-08dcbe2cc64e
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Aug 2024 19:51:09.4565 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 95a9dce2-04f2-4043-995d-1ec3861911c6
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1P110MB2005
Message-ID-Hash: GP42Z44GG6P2NFDCMVBOW75TXPA5ATE6
X-Message-ID-Hash: GP42Z44GG6P2NFDCMVBOW75TXPA5ATE6
X-MailFrom: inacio@cert.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-nfsv4.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Chuck Lever III <chuck.lever=40oracle.com@dmarc.ietf.org>, NFSv4 <nfsv4@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [nfsv4] Re: Feedback on user ID for any bis work
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/N1-uwyvk0GyZJOL-RHTWQFsX3dw>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Owner: <mailto:nfsv4-owner@ietf.org>
List-Post: <mailto:nfsv4@ietf.org>
List-Subscribe: <mailto:nfsv4-join@ietf.org>
List-Unsubscribe: <mailto:nfsv4-leave@ietf.org>
> On Aug 16, 2024, at 3:17 PM, Rick Macklem <rick.macklem@gmail.com> wrote: > > Warning: External Sender - do not click links or open attachments unless you recognize the sender and know the content is safe. > > > On Fri, Aug 16, 2024 at 9:26 AM Chuck Lever III <chuck.lever=40oracle.com@dmarc.ietf.org> wrote: > > > > On Aug 16, 2024, at 11:39 AM, Chris Inacio <inacio@cert.org> wrote: > > > > Dave, All, > > > > INDIVIDUAL CONTRIBUTOR HAT ON - NOT CHAIR > > > > We need this super brief conversation in one of the interim meetings about how user identity is communicated across NFSv4, and there are 2 options, UID/GID ‘integer's and then loosely defined ‘string’. So I’ve been digging into this and I would say, most definitely, do NOT remove the string. So what I can see so far, is that UID/GID numbers are used when auth ‘sys’ is the selected mechanism, where current the string is used when auth is tied to GSS-API. As far as I can tell, the kerberos principal name should be the string in the field. I certainly don’t yet have a full understanding about how everything is connected together. (Just sending the principal is nice and everything, but you want to be able to verify it, and HOLY RAT HOLE ROBIN is that confusing in practice.) > > > > So, the thing I’m trying to make sense of, how hard would it be to support TLS identities (X.509 certs really) instead of Kerberos. > > A perhaps subtle distinction here: > > The current RPC-with-TLS protocol uses x.509 explicitly only for authenticating > network peers (ie, hosts). RFC 9289 even says "not for user authentication". So > I think the term "TLS" here is probably misplaced. > > You instead want to invent a new RPC security flavor or flavors that authenticates > users (or, dare I say it, to extend GSSAPI to handle this for us) via an x.509 > certificate, or OAuth, or such like. Nothing to do with transport layer security, > which doesn't know from users. > There is the specific case Chuck named "TLS identity squashing", where > the client's X.509 cert. identifies a single user for all RPCs done > via the TLS session. > > This works ok for cases where the client is just a single user, such > as a mobile device. > [ci] That’s really interesting. I’ll have to look deeper at that. First order is that the tighter binding of user to host that allows that to work more easily? > As for making the Windows world work, I do not have any experience, > but a site in Sweden does it by using Windows AD as the Kerberos KDC. > (Not saying it is easy, but they do seem to make it work. I can give > you his email, if you are interested in finding out more.) > [ci] We accomplish this somewhat at “the office” (Carnegie Mellon) too. But running an AD is not something I’m (personally) up for. I did some reading on how this works with AD being the Kerberos for the Windows machines and then possibly using sub-domains and a Unix Kerberos for non-windows machines and building the trust relationship between the two KDCs. (You might see where this is going…) [ci] I’m not at liberty to discuss the more specific details of how we do it at CMU because it relates to how we build our overall security posture, but I roughly know how to pull it off. [ci] And if you’re a major enterprise or research institution, it isn’t (relatively) that massive a lift compared to the savings across needing to manage many thousands of end points of all flavors. If I’m not mistaken, Rick, you used to live in that world too; unlike a company, central IT is fairly week in saying what can come into the enterprise – especially weak when it comes to the computer a student beings when they come to campus. (It’s different on some of the administrative parts of the overall system.) [ci] But you still need an expert to do it. And it kinda makes Box look useful; even though it’s crazy to think that might be an efficient way to share data. > rick > > chris > > > That also opens a fairly different control domain. Kerberos is well suited to local enterprise control. You can do that with X.509, but really, my anecdotal experience says, X.509 certs for enterprise are too heavy a lift, but they’re the answer when you want a more global identity. That raises the question of target users of NFS protocol. And if we’re (or maybe that’s just me doing it?) opening a wound there – then maybe we want to be able to support authentication and authorization that is more cloud compatible, which is potentially more than X.509. > > > > These are just thoughts and feedback on some discussions. > > > > Chris > > > > > > P.S. > > > > The complexity of auth is BONKERS!!! So to kind of dig into this I have a freenas server running with ZFS as the backing store. It’s the FreeBSD variant 13.0 stream. I then deployed an LDAP and Kerberos solution (freeipa on Fedora) to have that running on an RPi4. (This is all in my house, by the way.) For clients, I have a _real_ menagerie of machines: Mac OS 14.6, RPi Raspbian, FreeBSD, and Win 11. For fun, that means NFS versions running are: Mac OS 14.0 - NFSv4.0, Raspbian/Linux NFSv4.2, FreeBSD 13.x - NFSv4.1, Win 11 - NFSv3. I can get most of the unixen to at least get a Kerberos user principal TGT. Machine-to-machine, host principals are still a bit of a challenge. The Windows machine seemingly would rather piss in my Cheerios than do what I want. (What engineer where convinced their UI people to be able to give error messages as ‘1450 resource unavailable’ and then you need to type `net helpmsg 1450` to get an actual error message, which is completely useless anyway? That person is either my hero or the devil.) And while Windows doesn’t want to cooperate at all, the unixen management of authentication identities is its own entire disjoint universe! ‘SSSD' on Linux, ‘nfsuserd' on FreeBSD, and I haven’t even tried to cross that bridge on Mac. So I’m still trying to get this collection of stuff to attempt to do full kerberos/gss-api negotiation on a mount. > > > > > > Maybe this is why people run with auth sys! > > No "maybe" about it, this /is/ why people stick with auth_sys. > > > -- > Chuck Lever > > > _______________________________________________ > nfsv4 mailing list -- nfsv4@ietf.org > To unsubscribe send an email to nfsv4-leave@ietf.org
- [nfsv4] Feedback on user ID for any bis work Chris Inacio
- [nfsv4] Re: Feedback on user ID for any bis work Chuck Lever III
- [nfsv4] Re: Feedback on user ID for any bis work Chuck Lever III
- [nfsv4] Re: Feedback on user ID for any bis work Pali Rohár
- [nfsv4] Re: Feedback on user ID for any bis work Chris Inacio
- [nfsv4] Re: Feedback on user ID for any bis work Rick Macklem
- [nfsv4] Re: Feedback on user ID for any bis work Chris Inacio
- [nfsv4] Re: Feedback on user ID for any bis work Chuck Lever III
- [nfsv4] Re: Feedback on user ID for any bis work Mkrtchyan, Tigran
- [nfsv4] Re: Feedback on user ID for any bis work Chris Inacio
- [nfsv4] Re: Feedback on user ID for any bis work David Noveck
- [nfsv4] Re: Feedback on user ID for any bis work Rick Macklem
- [nfsv4] Re: Feedback on user ID for any bis work Chris Inacio
- [nfsv4] Re: Feedback on user ID for any bis work Rick Macklem
- [nfsv4] Re: Feedback on user ID for any bis work Chris Inacio
- [nfsv4] Re: Feedback on user ID for any bis work Mkrtchyan, Tigran
- [nfsv4] Re: Feedback on user ID for any bis work Chuck Lever III
- [nfsv4] Re: Feedback on user ID for any bis work Chris Inacio
- [nfsv4] Re: Feedback on user ID for any bis work Mkrtchyan, Tigran
- [nfsv4] Re: Feedback on user ID for any bis work Mark Liam Brown
- [nfsv4] Re: Feedback on user ID for any bis work Chuck Lever III
- [nfsv4] Fwd: Re: Feedback on user ID for any bis … David Noveck