Re: [nfsv4] Comments on draft-ietf-nfsv4-integrity-measurement-07

Chuck Lever <chuck.lever@oracle.com> Mon, 11 November 2019 21:58 UTC

Return-Path: <chuck.lever@oracle.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D23F1120893 for <nfsv4@ietfa.amsl.com>; Mon, 11 Nov 2019 13:58:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.301
X-Spam-Level:
X-Spam-Status: No, score=-4.301 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=oracle.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nV8rUuFcfOcx for <nfsv4@ietfa.amsl.com>; Mon, 11 Nov 2019 13:58:00 -0800 (PST)
Received: from aserp2120.oracle.com (aserp2120.oracle.com [141.146.126.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6E281120089 for <nfsv4@ietf.org>; Mon, 11 Nov 2019 13:58:00 -0800 (PST)
Received: from pps.filterd (aserp2120.oracle.com [127.0.0.1]) by aserp2120.oracle.com (8.16.0.27/8.16.0.27) with SMTP id xABLnTlV054271; Mon, 11 Nov 2019 21:57:58 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=content-type : mime-version : subject : from : in-reply-to : date : cc : content-transfer-encoding : message-id : references : to; s=corp-2019-08-05; bh=5gevmEeMuVZQUQ4VWX+TYSBrQ9D/XumVo3VmLH8Np0Y=; b=GLIG71Td0c6Ab3IPr2mkwKWblNrrc8CZlegEkMWd2pu5kBF0knFSK3QhER04v1gCHuqH LzACVm0A8XwjU6BmKDsXPoh14yEEXwe2r1I/8CmiFhKuYisMWEb+fEypOqasml6LRLrM BGBOd7ChhU85nDaAOsmnfjSMZje4OioF67NUZ3aW+/fO4jnjsa1QLE7JgqM2K91UkeIR 7V5RlpJwkB9/xOVbTG2ZxfFWcLA7KBJZjLxLV351Ib5oz+FYxc0NP/t2I+DONcDZUN5I 3IyF7xYppRCiMPrzWXCtlCbr4TOlPUZteyjcQcZUBe3inTQJot1jT0W3sMoe21sgyQQR YQ==
Received: from userp3020.oracle.com (userp3020.oracle.com [156.151.31.79]) by aserp2120.oracle.com with ESMTP id 2w5ndq12ch-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 11 Nov 2019 21:57:58 +0000
Received: from pps.filterd (userp3020.oracle.com [127.0.0.1]) by userp3020.oracle.com (8.16.0.27/8.16.0.27) with SMTP id xABLnbl3040135; Mon, 11 Nov 2019 21:55:57 GMT
Received: from userv0121.oracle.com (userv0121.oracle.com [156.151.31.72]) by userp3020.oracle.com with ESMTP id 2w67kmn5x8-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 11 Nov 2019 21:55:57 +0000
Received: from abhmp0008.oracle.com (abhmp0008.oracle.com [141.146.116.14]) by userv0121.oracle.com (8.14.4/8.13.8) with ESMTP id xABLtuF2027478; Mon, 11 Nov 2019 21:55:56 GMT
Received: from anon-dhcp-152.1015granger.net (/68.61.232.219) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Mon, 11 Nov 2019 21:55:56 +0000
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
From: Chuck Lever <chuck.lever@oracle.com>
In-Reply-To: <CADaq8jckJQ2GZw-wEY-TLhqWhXcom1QNn8oTLL6TSNZy+4OHzg@mail.gmail.com>
Date: Mon, 11 Nov 2019 16:55:54 -0500
Cc: NFSv4 <nfsv4@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <9EAD488D-D246-4961-A6F7-4926734AF292@oracle.com>
References: <CAFt6BakApq=FJWs+r-jwxvTdXYs9yOg9KS47no93kdnp2gZ_+Q@mail.gmail.com> <9BEBDE7A-522A-4A6B-8132-D9C3A8A4922C@oracle.com> <CAFt6Ba=q=vSt+wtcHsi59gWnwFpuUaDqQue7f=GFSUvd25uV+g@mail.gmail.com> <BFDF314F-B913-4C4A-BAB4-C09FA840F4F6@oracle.com> <CADaq8jc_gM0SWe9weRJYp7s7xjtN9kihbVnUiBN61hF2LUJjzQ@mail.gmail.com> <FD12C92F-BBF4-4174-B896-48738C02B78E@oracle.com> <CAFt6BanwC4uu=9SpZQdiGjFswzkC3cSWPzGia34qBT5W+uuMNw@mail.gmail.com> <5B51BB44-F39D-4EF6-9E1E-3EF958F90260@oracle.com> <20191031192409.GJ88302@kduck.mit.edu> <67D69A00-D231-4845-A840-F3D67D629554@oracle.com> <CAFt6BanShDjwD3SftuDUvChFq9zOU5h1UC2y=W+3bVm++jAEKA@mail.gmail.com> <479C7409-9DCF-4C11-84AB-2E3729D96B22@oracle.com> <CADaq8jfMXjewirgvyCgh3D+yXQSNEX3HbWMCnz=XYCKk5T=6iA@mail.gmail.com> <00F112E6-F869-4624-A68E-9C909AB3B653@oracle.com> <CADaq8jckJQ2GZw-wEY-TLhqWhXcom1QNn8oTLL6TSNZy+4OHzg@mail.gmail.com>
To: David Noveck <davenoveck@gmail.com>, spencer shepler <spencer.shepler@gmail.com>, Spencer Shepler <sshepler@microsoft.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9438 signatures=668685
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1910280000 definitions=main-1911110188
X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9438 signatures=668685
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1910280000 definitions=main-1911110188
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/TnLdST4VSZypWATsJt-xnzh6gCw>
Subject: Re: [nfsv4] Comments on draft-ietf-nfsv4-integrity-measurement-07
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Nov 2019 21:58:03 -0000


> On Nov 11, 2019, at 2:43 PM, David Noveck <davenoveck@gmail.com> wrote:
> 
> 
> 
> On Fri, Nov 8, 2019, 10:12 AM Chuck Lever <chuck.lever@oracle.com> wrote:
> 
> 
>> > On Nov 7, 2019, at 6:13 PM, David Noveck <davenoveck@gmail.com> wrote:
>> > 
>> 
>> It appears that draft-ietf-nfsv4-integrity-measurement can't move
>> forward without some description of the IMA metadata format.
> 
> It is my understanding that you already plan to do that in -08.

That is what I proposed last week. Now I'm thinking the description
could be a separate document. Certainly a description could be
published separately by the IETF (eg., nfsv4, rats or teep) or it
could come from some other SSO (such as TCG).


>> My preference would be that the Linux community is responsible for
>> the process and document(s) that describe their own format.
> 
> That's very sensible but that doesn't mean it's going to happen.

As a card-carrying member of the Linux community, I can attempt to
get it done myself. Two issues:

 - Who will be responsible for maintaining the publication as new
Linux IMA formats are introduced. IMA is currently an active effort,
and I anticipate some integration with fs-verity will require a new
IMA metadata format.

- How long will it take to ensure the format is not encumbered by
patent or software license. I have contacts at the Linux Foundation
that I hope can help address this issue. I will also discuss this
with any copyright holders.


>> Failing
>> that, a description can be added to integrity-measurement, as I
>> recently proposed.
> 
> Understood.
> 
> 
>> To make an IANA registry a sensible thing to do, at least one more
>> independent integrity metadata format will have to be identified.
> 
> I think one has already been identified.  To make this scheme work, there will need to have a common metadata format implemented.
> 
> Once it is implemented, it will need to be specified, leaving you with following tasks:
> 	• Identifying a victim to provide it.
> 	• Figuring out when/where it will be provided.
> The virtue of the IANA registry is that it gives you the ability to defer these tasks.

Deferral would be nice, as that would enable integrity-measurement
to move forward sooner (assuming Spencer's objection is lifted).
But it might be unnecessary if I can get a document put together
and signed-off by others in the Linux community in the next few
months.

We did try an IANA registry before, and I'm willing to consider
that again to help move this along. The e-mail conversation a few
months ago rat-holed on whether or not there would be an actual
need for multiple metadata formats, as I recall. We can put aside
the question of over-engineering and decide simply that the document
will start with a registry containing one format discriminator.

There is also the question of whether the format discriminator field
not only marks the internal format, but also allows the storage and
retrieval of metadata stored in other xattrs (unlike the discriminator
for NFSv4 security labels, which applies only to one xattr).

IMA, for example, already uses two xattrs, security.ima and
security.evm, that can co-exist on the same file. It would be slick
to add support for security.evm simply by adding another entry into
the IANA registry.

Before I go too much further, however, I would like to hear from
Spencer if he believes these changes would adequately address his
concerns.


--
Chuck Lever