Re: [nfsv4] AD review of draft-ietf-nfsv4-rpc-tls

Chuck Lever <chuck.lever@oracle.com> Tue, 07 April 2020 18:07 UTC

Return-Path: <chuck.lever@oracle.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 99A9C3A0B97 for <nfsv4@ietfa.amsl.com>; Tue, 7 Apr 2020 11:07:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.267
X-Spam-Level:
X-Spam-Status: No, score=-2.267 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.168, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=oracle.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id y8cCYhbmW0lx for <nfsv4@ietfa.amsl.com>; Tue, 7 Apr 2020 11:07:16 -0700 (PDT)
Received: from aserp2120.oracle.com (aserp2120.oracle.com [141.146.126.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D4DC73A0B92 for <nfsv4@ietf.org>; Tue, 7 Apr 2020 11:07:11 -0700 (PDT)
Received: from pps.filterd (aserp2120.oracle.com [127.0.0.1]) by aserp2120.oracle.com (8.16.0.42/8.16.0.42) with SMTP id 037I3kwP138015; Tue, 7 Apr 2020 18:07:07 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=content-type : mime-version : subject : from : in-reply-to : date : cc : content-transfer-encoding : message-id : references : to; s=corp-2020-01-29; bh=bftiwa/OpNt58ccGJgHYJZcpVRbF6v5LETg2DRdCBNQ=; b=QsbybEYUqgHedwUbkXZBNyJ4SGAT+ba1yyBh+FI4QtTNTzn3AUmBPvr0nwh4jD6U4TQF kXKSGdI4v97ajwrvwBcmwaslp1eayc0qxlO1AzEJpKQ+4y8ynPIn/l/+rLRcH3NMAR7A TXPSgAyoytkIenGNku5A/JbSg0Lj84NvTW9kGBzFMYmgAcwwQqEG21b/ohJEnqXJZhnF gzeXSdn7zwkdaOmpOnN2/V6hbRAuiUUYZTrRILb4I4XfgXSkxGV1LNARKwcHRRrQ08nB pCOulDzyt2jGgE5gBwtDiNKoa3VNV62ZV+fRprAa4nzDWBJ2TbC2Hj+OzAOCOS+4mGoW xQ==
Received: from userp3020.oracle.com (userp3020.oracle.com [156.151.31.79]) by aserp2120.oracle.com with ESMTP id 306j6men4m-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 07 Apr 2020 18:07:07 +0000
Received: from pps.filterd (userp3020.oracle.com [127.0.0.1]) by userp3020.oracle.com (8.16.0.42/8.16.0.42) with SMTP id 037I2UXo012199; Tue, 7 Apr 2020 18:07:06 GMT
Received: from aserv0122.oracle.com (aserv0122.oracle.com [141.146.126.236]) by userp3020.oracle.com with ESMTP id 30839u1n9n-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 07 Apr 2020 18:07:06 +0000
Received: from abhmp0005.oracle.com (abhmp0005.oracle.com [141.146.116.11]) by aserv0122.oracle.com (8.14.4/8.14.4) with ESMTP id 037I75Gh007016; Tue, 7 Apr 2020 18:07:05 GMT
Received: from anon-dhcp-153.1015granger.net (/68.61.232.219) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Tue, 07 Apr 2020 11:07:05 -0700
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
From: Chuck Lever <chuck.lever@oracle.com>
In-Reply-To: <fd93517045dfa60c3145e0d9e9f2c89fbedaf49b.camel@ericsson.com>
Date: Tue, 07 Apr 2020 14:07:04 -0400
Cc: "nfsv4@ietf.org" <nfsv4@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <76F5F00C-60FD-4535-9137-5ADD787164AA@oracle.com>
References: <VI1PR0702MB3775838FD12AB8A89392C17B95C90@VI1PR0702MB3775.eurprd07.prod.outlook.com> <6E2BF0D5-821A-4AA1-9F72-ADDD45AFFE0E@oracle.com> <fd93517045dfa60c3145e0d9e9f2c89fbedaf49b.camel@ericsson.com>
To: Magnus Westerlund <magnus.westerlund@ericsson.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9584 signatures=668685
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 phishscore=0 spamscore=0 malwarescore=0 mlxscore=0 mlxlogscore=999 bulkscore=0 suspectscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2003020000 definitions=main-2004070148
X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9584 signatures=668685
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 bulkscore=0 mlxlogscore=999 spamscore=0 priorityscore=1501 suspectscore=0 lowpriorityscore=0 malwarescore=0 impostorscore=0 mlxscore=0 phishscore=0 adultscore=0 clxscore=1015 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2003020000 definitions=main-2004070148
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/VHYVELkp4MuhSASALROMaquTub8>
Subject: Re: [nfsv4] AD review of draft-ietf-nfsv4-rpc-tls
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Apr 2020 18:07:19 -0000

Hi Magnus -

> On Apr 6, 2020, at 9:08 AM, Magnus Westerlund <magnus.westerlund@ericsson.com> wrote:
> 
> Hi Chuck,
> 
> So this document is clearly an opportunistic mechanism. And I am not trying to
> push things beyond this in this document. However, I need to understand the
> answers to certain questions that are likely to arise in the IETF last call and
> IESG evaluation. 
> 
> Thanks for clarifying that due to layering, it would be a bad idea for this
> document to demand anything from NFS implementation. The NFS specificaiton
> extension/updates will have to make such requirement. I am fine with conveying
> that message to anyone raising this as an issue.

OK, glad we agree!


> Even on the RPC level, I do think the document can become clearer in that this
> document's solution is strongly recommended to be implemented to improve
> security. It is good that the document do dicsuss how policies can be
> established to move this mechanism beyond just opportunistic. Hinting on the
> likelihood that you will soon be required to support it. 
> 
> Thus, can one in introduce any RECOMMENDED/SHOULD writings on implementation of
> this mechanism for RPC implementors?

One choice is Dave's proposed expansion to the Introduction, but the use of
compliance keywords is usually not appropriate in the Introduction. So it sounds
like you are asking for changes somewhere else in the document...

Perhaps Section 7.1 is the best place, as it directly addresses the shortcomings
of opportunistic security mechanisms.


> Second are there aspect of the non-normative text that can be improved?

Always. Is there a particular example that stands out to you?


> Cheers
> 
> Magnus
> 
> 
> 
> 
> On Sun, 2020-04-05 at 13:58 -0400, Chuck Lever wrote:
>> Going back to Magnus' original concern:
>> 
>>> On Apr 1, 2020, at 4:27 AM, Magnus Westerlund <
>>> magnus.westerlund@ericsson.com> wrote:
>>> 
>>> 13. Requirement on implementation
>>> 
>>> Should this document actually update any or all of the versions of NFS 4 to
>>> mandate implementation support?
>> 
>> IMO the proper place to make fresh requirements on NFSv4 implementations is
>> in NFSv4-specific documents. I would rather not focus this document any more
>> on NFS than it already is. And we have a plan to author and publish one or
>> more NFSv4-specific documents regarding NFS-on-TLS (which will be covered
>> to some extent during our interim meeting).
>> 
>> So, I vote that this document should not update any NFSv4 standards-track
>> documents.
>> 
>> 
>>> From the WG's perspective doesn't it make sense to start demand
>>> implementation support. The mechanism is clearly opportunistic in its
>>> establishment, however the goal here needs to be to get support in as many
>>> places is as possible.
>> 
>> Agreed, but practically speaking, the WG is not in control of
>> implementations.
>> 
>> With the rpc-tls proposal IMO we are trying to walk a very fine line
>> between limiting protocol changes for existing implementations and
>> meeting a critical security need. The opportunistic behavior of this
>> mechanism is a key part of this proposal. And the document describes
>> clearly ways that implementations can make the force the use of TLS.
>> 
>> In other words, I'm hoping rpc-tls provides an easy step forward
>> towards "support in as many places as possible".
>> 
>> 
>>> Thus, sending a clearer signal that NFS 4.x servers and client are expected
>>> to support this should be sent. If not can you clarify what the concerns
>>> are? Because we are going to get this question again in the IESG evaluation.
>> 
>> We've placed early versions of this document in front of members of the
>> IETF's Security Directorate. They immediately recognized that an
>> opportunistic tactic such as the one we propose in rpc-tls is a well-
>> understand and practical way to improve security of legacy protocols
>> such as NFS. I don't expect that they will object to the opportunistic
>> nature of the proposal.
>> 
>> However, more context (like a security strategy statement) could be
>> helpful. Dave was working on a document like that, but I don't know
>> what state is is currently in. I don't see it in the personal drafts
>> section of the nfsv4 document datatracker.
>> 
>> Alternately we could introduce some security-related text to the
>> WG's charter that outlines NFSv4 security strategy.
>> 
>> 
>>> To me the reasonable plan towards always used transport security (something
>>> I expect the full updates, for example of NFS v4.1 to require) is to require
>>> implementation but not usage now. Then next step to require its usage.
>> 
>> That seems like jumping ahead of the gun. We have to get the new
>> mechanism out there first. Then a subsequent NFS-on-RPC-on-TLS I-D can
>> address the specifics of how NFSv4 will operate on TLS-protected
>> transports. As recent nfsv4@ threads show, there are crucial NFS-
>> specific details that need to be resolved before a requirement that
>> is practical for NFS implementations can be made.
>> 
>> IMO we are on a path towards requiring NFS with TLS. This document
>> is but the initial step.
>> 
>> 
>> --
>> Chuck Lever
>> 
>> 
>> 
> -- 
> Cheers
> 
> Magnus Westerlund 
> 
> 
> ----------------------------------------------------------------------
> Networks, Ericsson Research
> ----------------------------------------------------------------------
> Ericsson AB                 | Phone  +46 10 7148287
> Torshamnsgatan 23           | Mobile +46 73 0949079
> SE-164 80 Stockholm, Sweden | mailto: magnus.westerlund@ericsson.com
> ----------------------------------------------------------------------

--
Chuck Lever