[nfsv4] Re: Feedback on user ID for any bis work
Chris Inacio <inacio@cert.org> Mon, 19 August 2024 05:17 UTC
Return-Path: <inacio@cert.org>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 59CCDC14F705 for <nfsv4@ietfa.amsl.com>; Sun, 18 Aug 2024 22:17:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.108
X-Spam-Level:
X-Spam-Status: No, score=-2.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cert.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XGWrOnwcsEHl for <nfsv4@ietfa.amsl.com>; Sun, 18 Aug 2024 22:17:32 -0700 (PDT)
Received: from USG02-BN3-obe.outbound.protection.office365.us (mail-bn3usg02on0062.outbound.protection.office365.us [23.103.208.62]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0F5B0C14F6E9 for <nfsv4@ietf.org>; Sun, 18 Aug 2024 22:17:31 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector5401; d=microsoft.com; cv=none; b=N4zkkrekO861YK6HoYC+vyETgpX4soatTiJhBpEu/vqB8l9tOWf8r0iM+58Vq7J8fS7tGyunUjtKJTaAYA4xvfNNDUOjINTip97Xdv4Q06HpeeeSn7GK6yl+Po8Chk0Er+o1BFP8yYwtLK5H4WiYHIc0U+ztl68rx8kavfWneWwMZzFMCnNeS3cVCkDn7+MkvtMjrrJvVjs+mUQt+9efBZTnnMZDScr/7RD8Da/c6F7XP5Zx1DkIWL8hg+dlGj6C3RfvOWFm/bKwQ+LuZiv7/a0CFDfa6UdJi04F4gdGUJE3FFgjUnDBPIFIcwIIjKK4+GY02RZGk/qRfhi/UHwzQQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector5401; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=+JIJIRCTWnYzK4kVTQjKJXpY5H3s1ZBLGYPblC7tpKY=; b=vHBE0+e9lunNpNQ2Gjh5drI3BkJF0oLopz9M3hg4y/PVJt90zy62ttPghh71Q6FL7zQLm+k/6WWSotrsgvmUCM4tet7w5Q6V5aTzP9ZXGlDco3lADmOFQ38lvx0KdkyWGr27L6s/5YOz/0P+QHKyx5TRCGKMZbBNtZk2EHpQzSfX21y468tK6V5i+BB23x19gfCnD9hTgHCNIhNJVgY4yy5JtN8FQ09UpBENyTaTUh/exFG5wwTdqmMt2vzLSXZsPGyVs76yt1MEBLJ66vMkjOP3KFBuRvmjwaFSW6gLGekSWdWSlAiz5xrdOH0+CtsIKmDaKNtPlZ7tMxX4oepbUw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cert.org; dmarc=pass action=none header.from=cert.org; dkim=pass header.d=cert.org; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cert.org; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+JIJIRCTWnYzK4kVTQjKJXpY5H3s1ZBLGYPblC7tpKY=; b=LDrzXD3jAPFaDdYwTWjLsI97l4/oXIxLXIQ+cZIe1rQht5+tG9MEcy0+xChKJ2mzkYst/aoQCL7bBWVL/N4YpbcOugD+cnSrmdKP1SpOA/GCRIpM2wr0OLP9bhNwJv0iZzE4nrwab5t/qbTxJRUiXJva5xJQS8RBgLRVd8bjtG0=
Received: from SA1P110MB0975.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:172::5) by SA1P110MB1977.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:167::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7828.33; Mon, 19 Aug 2024 05:17:27 +0000
Received: from SA1P110MB0975.NAMP110.PROD.OUTLOOK.COM ([fe80::8aff:57ad:83e3:4567]) by SA1P110MB0975.NAMP110.PROD.OUTLOOK.COM ([fe80::8aff:57ad:83e3:4567%7]) with mapi id 15.20.7828.031; Mon, 19 Aug 2024 05:17:27 +0000
From: Chris Inacio <inacio@cert.org>
To: Rick Macklem <rick.macklem@gmail.com>
Thread-Topic: [nfsv4] Feedback on user ID for any bis work
Thread-Index: AQHa8BWkquOZ8G2ZEE+JkBu2ia0yN7IqWYSAgAAGxACAAXCEAIACPSuA
Date: Mon, 19 Aug 2024 05:17:27 +0000
Message-ID: <F85E20BD-309C-4B4A-B270-E00359A77D68@cert.org>
References: <88CFBD80-2BAA-43AE-8AA5-C032C2761266@cert.org> <DCD380BF-74D5-4FED-94EA-EC995A9DB164@oracle.com> <CAM5tNy7ELwEbE5z_VMC0ghePcMzkHAcEJDs4skvnxH4XJpeWLA@mail.gmail.com> <B0F6BCDA-CAE6-4985-AC0D-9DCAAEF68241@cert.org> <8CAD9D90-489B-45AC-A52E-6800E6AA0EAE@oracle.com> <EFD2C35A-9FC4-4381-82F2-475957CEE07B@cert.org> <CAM5tNy6EDNbjToQU7eo+0p8BEJsUbwJTOxx07mHL8N=70EtOGg@mail.gmail.com>
In-Reply-To: <CAM5tNy6EDNbjToQU7eo+0p8BEJsUbwJTOxx07mHL8N=70EtOGg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3776.700.51)
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cert.org;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: SA1P110MB0975:EE_|SA1P110MB1977:EE_
x-ms-office365-filtering-correlation-id: 0e9cfaae-3632-4de9-5243-08dcc00e3787
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;ARA:13230040|366016|1800799024|38070700018;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SA1P110MB0975.NAMP110.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(366016)(1800799024)(38070700018);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <032C21517C10DF40A34F70C3D047815D@NAMP110.PROD.OUTLOOK.COM>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: cert.org
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SA1P110MB0975.NAMP110.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 0e9cfaae-3632-4de9-5243-08dcc00e3787
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Aug 2024 05:17:27.2913 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 95a9dce2-04f2-4043-995d-1ec3861911c6
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1P110MB1977
Message-ID-Hash: QEEYZIUAL4DWUVUSQYNWQEONTBWFRLQM
X-Message-ID-Hash: QEEYZIUAL4DWUVUSQYNWQEONTBWFRLQM
X-MailFrom: inacio@cert.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-nfsv4.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: NFSv4 <nfsv4@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [nfsv4] Re: Feedback on user ID for any bis work
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/XIqNtXByalojcJXE7j3bf82as2k>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Owner: <mailto:nfsv4-owner@ietf.org>
List-Post: <mailto:nfsv4@ietf.org>
List-Subscribe: <mailto:nfsv4-join@ietf.org>
List-Unsubscribe: <mailto:nfsv4-leave@ietf.org>
> On Aug 17, 2024, at 3:05 PM, Rick Macklem <rick.macklem@gmail.com> wrote: > > Warning: External Sender - do not click links or open attachments unless you recognize the sender and know the content is safe. > > > > On Fri, Aug 16, 2024 at 2:07 PM Chris Inacio <inacio@cert.org> wrote: > > > > On Aug 16, 2024, at 4:42 PM, Chuck Lever III <chuck.lever@oracle.com> wrote: > > > > Warning: External Sender - do not click links or open attachments unless you recognize the sender and know the content is safe. > > > > > >> On Aug 16, 2024, at 3:51 PM, Chris Inacio <inacio@cert.org> wrote: > >> > >> > >> > >>> On Aug 16, 2024, at 3:17 PM, Rick Macklem <rick.macklem@gmail.com> wrote: > >>> > >>> Warning: External Sender - do not click links or open attachments unless you recognize the sender and know the content is safe. > >>> > >>> > >>>> On Fri, Aug 16, 2024 at 9:26 AM Chuck Lever III <chuck.lever=40oracle.com@dmarc.ietf.org> wrote: > >>>> > >>>> > >>>>> On Aug 16, 2024, at 11:39 AM, Chris Inacio <inacio@cert.org> wrote: > >>>>> > >>>>> Dave, All, > >>>>> > >>>>> INDIVIDUAL CONTRIBUTOR HAT ON - NOT CHAIR > >>>>> > >>>>> We need this super brief conversation in one of the interim meetings about how user identity is communicated across NFSv4, and there are 2 options, UID/GID ‘integer's and then loosely defined ‘string’. So I’ve been digging into this and I would say, most definitely, do NOT remove the string. So what I can see so far, is that UID/GID numbers are used when auth ‘sys’ is the selected mechanism, where current the string is used when auth is tied to GSS-API. As far as I can tell, the kerberos principal name should be the string in the field. I certainly don’t yet have a full understanding about how everything is connected together. (Just sending the principal is nice and everything, but you want to be able to verify it, and HOLY RAT HOLE ROBIN is that confusing in practice.) > >>>>> > >>>>> So, the thing I’m trying to make sense of, how hard would it be to support TLS identities (X.509 certs really) instead of Kerberos. > >>>> > >>>> A perhaps subtle distinction here: > >>>> > >>>> The current RPC-with-TLS protocol uses x.509 explicitly only for authenticating > >>>> network peers (ie, hosts). RFC 9289 even says "not for user authentication". So > >>>> I think the term "TLS" here is probably misplaced. > >>>> > >>>> You instead want to invent a new RPC security flavor or flavors that authenticates > >>>> users (or, dare I say it, to extend GSSAPI to handle this for us) via an x.509 > >>>> certificate, or OAuth, or such like. Nothing to do with transport layer security, > >>>> which doesn't know from users. > >>> There is the specific case Chuck named "TLS identity squashing", where > >>> the client's X.509 cert. identifies a single user for all RPCs done > >>> via the TLS session. > >>> > >>> This works ok for cases where the client is just a single user, such > >>> as a mobile device. > >>> > >> > >> [ci] That’s really interesting. I’ll have to look deeper at that. First order is that the tighter binding of user to host that allows that to work more easily? > > > > Rick implemented this for FreeBSD, and I have a plan to implement > > this in Linux NFSD in a way that is hopefully compatible with his > > implementation. It is merely a convention of adding a user identity > > to the client certificate's SAN field; the receiving server then > > squashes all RPC traffic from peers using that certificate to that > > user ID. > > > > But I didn't mention it before because I assumed you were interested > > in the more general multi-user case. > > > > [ci] You’re right in that I’m primarily interested in the more general use case. And I get some of the possible limitations / hiccups of the version you’re describing. (Mount at boot before user auth, etc.) If you add a field to the certificate, who and when is the signer? > > [ci] It might be more interesting about the “squashes all RPC traffic” part. It seems a bit like a protocol hack, at first blush, to me. But then I don’t understand NFS that deeply, so I could be /really/ off base on that point. But even if it is, does that provide an avenue to think about how new/different auth might be achieved. > > [ci] Although back to your first point, to my current understanding of NFSv4, the "right way”* is most likely API extensions in GSS. My thinking (at the moment) is that I would want to enable where auth is at today, especially if I think enterprise and things like hybrid clouds. I guess that means things like OAUTH, SCIM(?), and still kerberos (and I guess add JWT/CWT). What would make a seamless transition to accessing storage in the enterprise, being able to share to possibly local cloud compute, push up the cloud provider, extend to multi-cloud, and move back down allowing a client end point to have strong authentication and authorization across that. And for bonus points, it would be /really/ nice to be able to smoothly grow up from 3 people in a “garage” to 1000 as an enterprise, and beyond. > > [ci] Free dinner on me if you and Rick have a prototype doing AA for that. > > [ci] I don’t know of any pain free strong AA solutions that I would want to run in my house. I wish I could say that would be in scope - but I doubt my house compute / network is reasonable in 99% of the world's opinion. > > > [ci] * - for some definition of right. > Once upon a time (over 20years ago) I recall asking "what does the domain in owner > mean?". I think the response was something like "we are considering a new DNS record > type for it". > > Maybe this is worth visiting? > If there was a DNS record type (similar to MX for email) that provided IP host address(es) > for a "user domain", then clients might be able to configure themselves more easily? > For example, suppose the IP host address in the reply had a KDC and LDAP server on it. > --> The client could configure Kerberos and LDAP to covert between names<->numbers > from that. > --> Kerberos would still be needed, but the only work would be on the server end. > [ci] We can ask the DNS folks how painful such an extension would be. It could always be added in a TXT record more informally. [ci] should have read this earlier, because (while it still doesn’t work); I fixed the LDAP config on my Mac and I’m getting very different behavior on the wire. Which is good. By the auto mounter attempting all manner of look ups in LDAP and then failing is just yet another config item, somewhere…. So I didn’t realized how critical in the process having LDAP is; I would have thought getting the Kerberos TGT would be sufficient, but I guess that doesn’t really tell you UID/GID, etc. (after I think about it.) > Then there is the hassle of creating a Kerberos principal to be a machine credential > for a client and creating/moving a keytab entry into the client. > --> For this one, I think that rfc5661bis might be able to fix the problem. > Right now, RFC8881 specifies that SP4_MACH_CRED requires krb5i or krb5p. > (Understandable, since that was all there was.) > Now, RPC-over-TLS where the client provides a X.509 cert. during handshake (mtls) > should be sufficient to satisfy the requirements for SP4_MACH_CRED, I think? > (Then the machine principal could just be uid 0 over AUTH_SYS, since the X.509 > cert. is the machine credential and TLS provides the on-the-wire security.) > If you get rid of the need for a client to have a Kerberos keytab, all a client > needs is a krb5.conf and a X.509 cert. If the krb5.conf can be created from a DNS > "user domain" record, there is even less work. > > Although I support ideas for alternatives to Kerberos for user authentication, I > doubt they will be a lot simpler to setup/implement. > [ci] that appears to be true. Although we might be able to take advantage of DANCE (https://datatracker.ietf.org/wg/DANCE) to more TLS lifting for us at least for machine ID. > rick > > > > > -- > > Chuck Lever > >
- [nfsv4] Feedback on user ID for any bis work Chris Inacio
- [nfsv4] Re: Feedback on user ID for any bis work Chuck Lever III
- [nfsv4] Re: Feedback on user ID for any bis work Chuck Lever III
- [nfsv4] Re: Feedback on user ID for any bis work Pali Rohár
- [nfsv4] Re: Feedback on user ID for any bis work Chris Inacio
- [nfsv4] Re: Feedback on user ID for any bis work Rick Macklem
- [nfsv4] Re: Feedback on user ID for any bis work Chris Inacio
- [nfsv4] Re: Feedback on user ID for any bis work Chuck Lever III
- [nfsv4] Re: Feedback on user ID for any bis work Mkrtchyan, Tigran
- [nfsv4] Re: Feedback on user ID for any bis work Chris Inacio
- [nfsv4] Re: Feedback on user ID for any bis work David Noveck
- [nfsv4] Re: Feedback on user ID for any bis work Rick Macklem
- [nfsv4] Re: Feedback on user ID for any bis work Chris Inacio
- [nfsv4] Re: Feedback on user ID for any bis work Rick Macklem
- [nfsv4] Re: Feedback on user ID for any bis work Chris Inacio
- [nfsv4] Re: Feedback on user ID for any bis work Mkrtchyan, Tigran
- [nfsv4] Re: Feedback on user ID for any bis work Chuck Lever III
- [nfsv4] Re: Feedback on user ID for any bis work Chris Inacio
- [nfsv4] Re: Feedback on user ID for any bis work Mkrtchyan, Tigran
- [nfsv4] Re: Feedback on user ID for any bis work Mark Liam Brown
- [nfsv4] Re: Feedback on user ID for any bis work Chuck Lever III
- [nfsv4] Fwd: Re: Feedback on user ID for any bis … David Noveck