Re: [nfsv4] Fwd: New Version Notification for draft-dnoveck-nfsv4-security-04.txt

Rick Macklem <rmacklem@uoguelph.ca> Sat, 08 January 2022 16:41 UTC

Return-Path: <rmacklem@uoguelph.ca>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2BF643A1859; Sat, 8 Jan 2022 08:41:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.101
X-Spam-Level:
X-Spam-Status: No, score=-2.101 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=uoguelph.ca
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bd6FQV7akKBW; Sat, 8 Jan 2022 08:41:09 -0800 (PST)
Received: from CAN01-TO1-obe.outbound.protection.outlook.com (mail-eopbgr670082.outbound.protection.outlook.com [40.107.67.82]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 745C43A1858; Sat, 8 Jan 2022 08:41:08 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=UywvxNkSvwKiLqCN69VADH37LLiAL0a1Od7Mb2QDyMspTZ0NzRpdHfDQQJlz0T+cIJ2cN9tl/ecJBsJrdSELkO8DzF0a1y9szPzClAfrLu0GoxO3GnauFOtFr256AuheCrGsB9SNtNHdF9Pc3KQDo6B3SfGxdPdYF2ll6KJBxth2QvpNnThAkdQuJRwLXX3HkGKsuAAmEQtv4Pttfo404HPwYmdOJ0O8mq5DoentRAd+ydnfzCXAY0ZGEirN8XwRZqEV1mBzz+16SrgIixMhtb2HSvGCyNNlNkfcLWhKa1YQMVTYDjqSSPUgvwOsBBZEvI9XlmP/frV0bNzai/AKrA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=3xmSsAnnXIgqhh4zLNx3/nTXnZGxHczpkO/jIBlQdEo=; b=HJn7oZMmysdaArdHbxQny4P5VeBxPCZl92oL7PuN3M59/zKdisLM8X7li6uRVW2Q6PzXiQVscQCIKkvSgM4osPYjJ3QP715Oo+BNdZSygXLluZeWjLYF2X205WxNYPrCRDwU/o+4E7iPmc5pZXfQObL3laix5zwg9QCLmaFtfV4uiDdvI7bkMNrVS8U8asLddFRVTHhIzyoV/IvE5qNOsIY3s1FXviLV9Qd+xhK86k4eMb9tOIWt4pFr66UTREIcWovcfK6EPkqhGuI+SdIOC0/ybRkc2b9nGI0D/I4gYC9+03CyYDyPcBn1LYs1wMDeOy8pm1gn8gUfqgEmrz6dqg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=uoguelph.ca; dmarc=pass action=none header.from=uoguelph.ca; dkim=pass header.d=uoguelph.ca; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=uoguelph.ca; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3xmSsAnnXIgqhh4zLNx3/nTXnZGxHczpkO/jIBlQdEo=; b=mcP097hyu9OJd2rNGJGh8rhjCL2mHGC7lhIonXpSMn1Ryh5xaEaNefW9QtULUAZzo4gluZwHuOeINYmyJWfcpH8kWwxoHHqiQBhXXH+J7zppgmmi9e8rFs8cWvq/9Dy+EtjH4/Um48bNq7q8JDs0qD29KsdJpjPcs7g5pRbr5U8+AguuNiWE8roQqHhIzHRuhXVGTDSjywBDol+N1aovgXDPlOxP5DpY+Iy2fDKrKwSJSLTASBQqNcaAzLU/h1ud5E6ygUYTPHxg24VGbRy/ZYea9FJtDpERFNcpCVEwFeIvBt3s6ZiylGPuXPFqysgNeE061L4BWg2OiPLVtB4F3Q==
Received: from YQXPR0101MB0968.CANPRD01.PROD.OUTLOOK.COM (2603:10b6:c00:19::29) by YQXPR0101MB1976.CANPRD01.PROD.OUTLOOK.COM (2603:10b6:c00:25::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4867.9; Sat, 8 Jan 2022 16:41:03 +0000
Received: from YQXPR0101MB0968.CANPRD01.PROD.OUTLOOK.COM ([fe80::c9d2:bf41:eeca:90aa]) by YQXPR0101MB0968.CANPRD01.PROD.OUTLOOK.COM ([fe80::c9d2:bf41:eeca:90aa%4]) with mapi id 15.20.4867.011; Sat, 8 Jan 2022 16:41:03 +0000
From: Rick Macklem <rmacklem@uoguelph.ca>
To: David Noveck <davenoveck@gmail.com>
CC: NFSv4 <nfsv4@ietf.org>, nfsv4-chairs <nfsv4-chairs@ietf.org>, "nfsv4-ads@ietf.org" <nfsv4-ads@ietf.org>
Thread-Topic: [nfsv4] Fwd: New Version Notification for draft-dnoveck-nfsv4-security-04.txt
Thread-Index: AQHX+M0Zr/DOM25hTke40cIHszU7L6xJvgjZgA5u7QCAATmMVQ==
Date: Sat, 08 Jan 2022 16:41:03 +0000
Message-ID: <YQXPR0101MB09688A093AD2FDDFA0AF70B2DD4E9@YQXPR0101MB0968.CANPRD01.PROD.OUTLOOK.COM>
References: <164035267965.25968.10921853654415505678@ietfa.amsl.com> <CADaq8jcXitpCCA+y3u6dYxGM95rfX6UtuZTm27g=Ht6=8x3+Qw@mail.gmail.com> <YQXPR0101MB0968955CCDDFC660EE9180D1DD449@YQXPR0101MB0968.CANPRD01.PROD.OUTLOOK.COM> <CADaq8jeitOwexgH2tq5azmCj9937SBw6e18+qrAYAFC==LhsRA@mail.gmail.com>
In-Reply-To: <CADaq8jeitOwexgH2tq5azmCj9937SBw6e18+qrAYAFC==LhsRA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
suggested_attachment_session_id: b1ee4543-d65b-a303-d635-81459bf96828
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=uoguelph.ca;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: eddb7cc9-4e2e-44a5-54e0-08d9d2c5a8c2
x-ms-traffictypediagnostic: YQXPR0101MB1976:EE_
x-microsoft-antispam-prvs: <YQXPR0101MB1976F5ED8DA603708E8B3921DD4E9@YQXPR0101MB1976.CANPRD01.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:YQXPR0101MB0968.CANPRD01.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(366004)(53546011)(64756008)(52536014)(9686003)(186003)(786003)(76116006)(316002)(6506007)(38100700002)(4326008)(45080400002)(966005)(508600001)(6916009)(7696005)(86362001)(71200400001)(38070700005)(122000001)(66446008)(91956017)(15650500001)(66556008)(66476007)(33656002)(83380400001)(4001150100001)(54906003)(66946007)(8676002)(55016003)(8936002)(2906002)(5660300002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: uoguelph.ca
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: YQXPR0101MB0968.CANPRD01.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: eddb7cc9-4e2e-44a5-54e0-08d9d2c5a8c2
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Jan 2022 16:41:03.0552 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: be62a12b-2cad-49a1-a5fa-85f4f3156a7d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: m0ndNxT5HYu4H0N8/zWYi9MEPsX0/8jMtL1iX42LPweCSQG5N9fKv+xs4UpEJZvaeAAKyW/T7rN9WAAMarS3Bw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: YQXPR0101MB1976
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/QXE7JkbiXHiMgGrKGBFCh_s48sk>
Subject: Re: [nfsv4] Fwd: New Version Notification for draft-dnoveck-nfsv4-security-04.txt
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 08 Jan 2022 16:41:13 -0000

David Noveck wrote:
[> Rick Macklem wrote:
[stuff snipped]
> > Why?
> > Well, my understanding is that APPEND_DATA does not apply to
> > any old Write that happens to start at EOF, but specifically "append-only"
>
> The spec says the contrary.  since there are no NFSv4 append-only operations it
> would not make sense to revise it in line with your understanding.
Ok, yes. I found a Microsoft document that states APPEND_DATA allows writes
that start at EOF.

But what about:
- Setattr of size, where this size is beyond EOF.
  (Not covered by APPEND_DATA, so presumably allowed/denied via
   WRITE_DATA.)
- A Write with an offset > size (ie past EOF).
  (Also allowed/denied via WRITE_DATA.)

So, does WRITE_DATA being set without APPEND_DATA being set make
sense. Not really, but it is allowed by the RFCs, as far as I can see?
It just makes no sense to allow a Write that starts beyond EOF, but not
one that starts at EOF.

So, I understand your position, but I believe (it is not up to me), that
FreeBSD's NFSv4 server will simply choose to continue to ignore APPEND_DATA.

On the PSARC/2010/029 document:
- The author of the FreeBSD NFSv4 ACL code no longer has a copy, either.
   However, he recalls the main item in it was an alternate algorithm for
   converting mode->ACL. The "canonical six" upset Windows, because it
   mixes allow/deny ACEs and apparently Windows likes all the Allow ACEs
   to preceed all the Deny ACEs.
   - This alternate algorithm creates a set of Allow ACEs followed by a set of
      Deny ACEs that are semnatically equivalent to the "canonical six".

I should have a chance to do some NFSv4 ACL testing against a Linux
server on Sunday and will post after that.

rick


file operations. (A POSIX write done on a file opened with the O_APPEND
flag would be one example.)
Since "append-only" file operations do not exist in NFSv4 (as you noted).

true but the server is still able to distinguish writes that extend the file from those that don't.

then ignoring APPEND_DATA seems more correct that assuming it to be
equivalent to WRITE_DATA.

It doesn't make sense to define this mask bit and then ignore it all the time.    When are you supposing it will be looked at?


For example, assume a file with APPEND_DATA allowed, but WRITE_DATA not
allowed that is of size == 0. If APPEND_DATA is sufficient to allow an Open with
OPEN_SHARE_ACCESS_WRITE, then a client could do the following:
- Open the file with OPEN_SHARE_ACCESS_WRITE
  - Write data to the file sequentially (the most common write usage).
--> Not what APPEND_DATA allowed but WRITE_DATA not allowed means,
       from my understanding.

The spec  says that this is allowed.

  *  Servers that do not distinguish between WRITE_DATA and APPEND_DATA
      need to make it clear to clients that support for append-only
      files is not present.  To do that, requests to set NFSv4 ACLs
      where the handling for these two masks are different for any
      specified user or group are to be rejected with
      NFS4ERR_ATTRNOTSUPP.

First, given that there is no OPEN_SHARE_ACCESS_APPEND, this applies to
all NFSv4 servers.

No.   It only applies to servers, and they will be common, that do not distinguish WRITE_DATA and APPEND_DATA.   Some if the confusion here resUlts from the fact that, like our old friend owner-override semantics., this is a case in which the handling at OPEN time is different from that at IO time.

Second, although I can understand that this would "make it clear to clients",
there are issues with doing this for systems like FreeBSD, where NFSv4 ACLs
are used locally as well as for the NFSv4 server.
For example, on FreeBSD:
- A setfacl(1) can set any combination of APPEND_DATA, WRITE_DATA or both
  APPEND_DATA and WRITE_DATA for allow/deny when done locally on UFS or ZFS
  file systems.
- A getfacl(1) will show them separately.
If FreeBSD were to enforce the above in the NFSv4 server, the getfacl(1) on a FreeBSD
NFSv4 client would show any combination as above, but the setfacl(1) would fail
for the case where only one of APPEND_DATA/WRITE_DATA is being set.
Users would find this a weird, irritating inconsistency. (As such, it won't be the case
for FreeBSD NFSv4 servers.)

I'd prefer that setting any combination be allowed, but that enforcement of APPEND_DATA
not be done for the NFSv4 server and that APPEND_DATA be handled like other non-enforcible
bits, such as SYNCHRONIZE.

I see your point but note that there is a significant difference between SYNCHRONIZE which is unenforceable since there is no operation to exercise it and APPEND_DATA since there is since people extend files all the time.   As such, APPEND_DATA is enforceable although the server might not enforce the distinction between APPEND_DATA and WRITE_DATA.

If I understand correctly, you are intending to accept an acl that APPEND_DATA and not WRITE_DATA  and then not let the user open the file for write.   I don't know about your users but I would certainly feel that was a "weird, irritating inconsistency".

It seems to me that ace masks were specified including APPEND_DATA to support windows applications with insufficient thought as to how this might  map to the world of UNIX.   Still, we are where we are and have to deal with this.

How would you feel about the following revision of the paragraph for -05?

  *  Servers that do not distinguish between WRITE_DATA and APPEND_DATA
      may need to make it clear to clients that support for append-only
      files is not present.  One way to do that is for requests to set NFSv4 ACLs
      where the handling for these two masks are different for any
      specified user or group to be rejected with     NFS4ERR_ATTRNOTSUPP.





rick

________________________________________
From: nfsv4 <nfsv4-bounces@ietf.org<mailto:nfsv4-bounces@ietf.org>> on behalf of David Noveck <davenoveck@gmail.com<mailto:davenoveck@gmail.com>>
Sent: Friday, December 24, 2021 8:49 AM
To: NFSv4; nfsv4-chairs; nfsv4-ads@ietf.org<mailto:nfsv4-ads@ietf.org>
Subject: [nfsv4] Fwd: New Version Notification for draft-dnoveck-nfsv4-security-04.txt

CAUTION: This email originated from outside of the University of Guelph. Do not click links or open attachments unless you recognize the sender and know the content is safe. If in doubt, forward suspicious emails to IThelp@uoguelph.ca<mailto:IThelp@uoguelph.ca>


I've just posted security-04.   Thanks to Rick Macklem and Chuck Lever who made important suggestions that I hope are correctly addressed in this version.  An rfcdiff with -03 is not small but it is helpful to see what has changed.

As previously discussed, I am proposing that the working group adopt this draft as a working group document.   I expect Brian and Zahed to set the timeline for that discussion.

Please let me know about your suggestions for -05.

---------- Forwarded message ---------
From: <internet-drafts@ietf.org<mailto:internet-drafts@ietf.org><mailto:internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>>>
Date: Fri, Dec 24, 2021 at 8:31 AM
Subject: New Version Notification for draft-dnoveck-nfsv4-security-04.txt
To: David Noveck <davenoveck@gmail.com<mailto:davenoveck@gmail.com><mailto:davenoveck@gmail.com<mailto:davenoveck@gmail.com>>>



A new version of I-D, draft-dnoveck-nfsv4-security-04.txt
has been successfully submitted by David Noveck and posted to the
IETF repository.

Name:           draft-dnoveck-nfsv4-security
Revision:       04
Title:          Security for the NFSv4 Protocols
Document date:  2021-12-24
Group:          Individual Submission
Pages:          129
URL:            https://www.ietf.org/archive/id/draft-dnoveck-nfsv4-security-04.txt
Status:         https://datatracker.ietf.org/doc/draft-dnoveck-nfsv4-security/
Html:           https://www.ietf.org/archive/id/draft-dnoveck-nfsv4-security-04.html
Htmlized:       https://datatracker.ietf.org/doc/html/draft-dnoveck-nfsv4-security
Diff:           https://www.ietf.org/rfcdiff?url2=draft-dnoveck-nfsv4-security-04

Abstract:
   This document describes the core security features of the NFSv4
   family of protocols, applying to all minor versions.  The discussion
   includes the use of security features provided by RPC on a per-
   connection basis.

   This preliminary version of the document, is intended, in large part,
   to result in working group discussion regarding existing NFSv4
   security issues and to provide a framework for addressing these
   issues and obtaining working group consensus regarding necessary
   changes.

   When a successor document is eventually published as an RFC, it will
   supersede the description of security appearing in existing minor
   version specification documents such as RFC 7530 and RFC 8881.




The IETF Secretariat