Re: [nfsv4] Comments on minutes of wg meeting at IETF114

Rick Macklem <rmacklem@uoguelph.ca> Wed, 14 September 2022 02:10 UTC

Return-Path: <rmacklem@uoguelph.ca>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A54E6C14F74B for <nfsv4@ietfa.amsl.com>; Tue, 13 Sep 2022 19:10:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.108
X-Spam-Level:
X-Spam-Status: No, score=-2.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=uoguelph.ca
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1JAMXRTQB077 for <nfsv4@ietfa.amsl.com>; Tue, 13 Sep 2022 19:09:58 -0700 (PDT)
Received: from CAN01-YQB-obe.outbound.protection.outlook.com (mail-yqbcan01on2075.outbound.protection.outlook.com [40.107.116.75]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9BFD7C14F613 for <nfsv4@ietf.org>; Tue, 13 Sep 2022 19:09:58 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=OXzN/xPlnwnmh+0/BpOjCIwcMXd11i2FHcL24aj/XSLkmY79oT43Hzzpjw35i+qolL8ZKP8n3iJ0ROC8+aqeEAI9QzvQXUBZWcdlubM2PJ3pbUqxAJLubjaO2UMCSTbEMhLf9SYhzb9EqxwdWozldma4qE5hyZJSzxH29u9onQ2uMFM1GBg6X14jwZ/sz0pAh9VtnuU44ggxUD9Ocr4iv6V51/KDGJE3Z9XhEB24EZmYlnPRBnsHxhGgMERWUfVCGGrOS392oGJSfkdBdltHOdI5j2Vj2zYn6WonWBxPi2domZ1Bzk8bvZ/p/zOijJ8v4Akc94tQK+G7IRlcrdxAeQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=/IDsZZcPhH0Z3zKr0Ih26edOjyK+63TzWRwh5uOu6Z0=; b=HjMm/6glWrx6OHWpX7H8IxqArML+bSWoxlLH0zwDbKMlCyjgyBXmp8eyjcxBpcos4fe4Ci2whMyGzLPqTXQNvW5NYXm9JLrcVWvec7ldeF1GeJnXkWTs8KayP7ix5Pt/bP/U/LQUUv3bdgVQJfMn8AOuF6FhJXX0zLguq2N842AhJs7dq/zDqCYzzCuwVd8xMwh1gbL3c3LiGAeCX857SzeRJSTqgVGTPKNym8ifPpbKa5LrfnNKHaYP12UXq5dHYHPCopIhybom5hccgdHF+s1ex0b85JwTcoKw1xjOKwfW9S+qdj8zUkvMlLxBLmTHhm7cmY9H3jCLJ3IlmbtXcg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=uoguelph.ca; dmarc=pass action=none header.from=uoguelph.ca; dkim=pass header.d=uoguelph.ca; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=uoguelph.ca; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/IDsZZcPhH0Z3zKr0Ih26edOjyK+63TzWRwh5uOu6Z0=; b=W98SK4H9KYfnwFo1ysxbA0iTzIlrlIPCxG4uo3LQE6+l37t8VP8ghYXF9XyTQfQA/fD890ZuHP++Xu06pGYDLhlhELHbE5JFwR1hkEPtuhh4mp58PRrsYdji61GZ68IpZvWa69JcGyG/h28meZQIY1y+bswmPgs5iC1yiD+CIG/P/LLOF+TsB/SSlWEoHO4p+hoCIILher04hZPJvLKF2rr/5y4s3TCQm8s+gteTRFCuziAgmM3jxKjO1pxcmK+y9ImQ9Z+9nc5eMUCJnvoITxEU3OLhKhTeq59sz20YESJZeJhQes60NOvhvnRS+fhRaFZa/4/kNqdgxlmqja3FnA==
Received: from YQXPR01MB4150.CANPRD01.PROD.OUTLOOK.COM (2603:10b6:c01:6::7) by YT3PR01MB5681.CANPRD01.PROD.OUTLOOK.COM (2603:10b6:b01:5c::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5612.21; Wed, 14 Sep 2022 02:09:55 +0000
Received: from YQXPR01MB4150.CANPRD01.PROD.OUTLOOK.COM ([fe80::980d:23ea:9bc2:9f37]) by YQXPR01MB4150.CANPRD01.PROD.OUTLOOK.COM ([fe80::980d:23ea:9bc2:9f37%9]) with mapi id 15.20.5612.022; Wed, 14 Sep 2022 02:09:50 +0000
From: Rick Macklem <rmacklem@uoguelph.ca>
To: Chuck Lever III <chuck.lever@oracle.com>, NFSv4 <nfsv4@ietf.org>
Thread-Topic: [nfsv4] Comments on minutes of wg meeting at IETF114
Thread-Index: AQHYxjPDm6k+YDWREEG5Y4QNw6y1YK3b7L6AgAFf0YCAAEVyAIAAmD3S
Date: Wed, 14 Sep 2022 02:09:50 +0000
Message-ID: <YQXPR01MB41506E793FF6F63EC6B1E185DD469@YQXPR01MB4150.CANPRD01.PROD.OUTLOOK.COM>
References: <CADaq8jd4+FPhH0m5AuBgop_xJiYMjrRKva8mX0A-gioW_8b+5A@mail.gmail.com> <2CCC6B48-118F-48C3-A764-1380BAB72066@oracle.com> <CADaq8jeoyLbC_cFd8FwSzuSGFZAi9r3UsTGAxx5KykW+-99Jmg@mail.gmail.com> <606B4B27-0DC1-4215-987F-D97A37C4C278@oracle.com>
In-Reply-To: <606B4B27-0DC1-4215-987F-D97A37C4C278@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=uoguelph.ca;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: YQXPR01MB4150:EE_|YT3PR01MB5681:EE_
x-ms-office365-filtering-correlation-id: d3ce6960-d8ac-4244-e84a-08da95f6346c
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: W/LlOSKqoV5J4yP10vMeMGpQcUVv2eCvxFsQHfDmkv4+3QUFCYDwtiY2kvKN2wI2g1igK0ZfmIaZWmX+qPXHpl37pTshZFyPJH2FNio934nBx9KbLYSyLtHbgD3t4RcbPco5ZKwfCKKzCeKUIG3QRQHggfPuoLNrsX95Xxl/krdAXst9mrJTrt0pDarx3e480f1ajrOybIq5ml6NHXsKiRZzRSWzTtidziey3/wVz7wleiPaaNGoj3IHYObge65yhYPAK3BCr+yGr3P1AA1AySKqMyQqjXckQxWZX4gKUrmliEhX7V8GD3J4UNE51wxwfC9wF3pu8FLxdyzeVOWzhvcivpO+ZG2j9cLy2Zld7lsWXw8aQKyAExYQyBGcHlhOiGIij/HY+eqTwFuQhDLHwHT3Yqt21riqt2h6+1qQHlRofYdekx9/SUJ9PGpXBe2qZ5ZxbDw2jaDLWpBf+qa6LuP2he5o6tSkrY04NNioO3fiDIh7FToQLS1bCZLNO4QDHv90lo6n+tSHMuQkTECZs3V9+eK5xf8WdMEiRz0BPYxqQY4jb+YgJbndx9ZW93i8FPE985lMMah2Cb9bHxL8yYFxSjGLLXGaqJUvqsKKFfFRBv3uEpfVQ0TV8CIG9hrbXJeHzJ1+EEAPAl2evSfsdXi1O/6hDLGgrHLCj9SFfA3ZvPFDNRhvcLwLnuHO6AiAhJzmcYkgo5hO8Qy4R8cLKg==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:YQXPR01MB4150.CANPRD01.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230022)(4636009)(366004)(136003)(39860400002)(396003)(346002)(376002)(451199015)(2906002)(66556008)(66946007)(5660300002)(33656002)(86362001)(66446008)(8676002)(478600001)(38070700005)(786003)(316002)(122000001)(26005)(55016003)(52536014)(110136005)(76116006)(8936002)(71200400001)(186003)(41300700001)(41320700001)(9686003)(83380400001)(38100700002)(66476007)(7696005)(91956017)(64756008)(6506007); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: uoguelph.ca
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: YQXPR01MB4150.CANPRD01.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: d3ce6960-d8ac-4244-e84a-08da95f6346c
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Sep 2022 02:09:50.0235 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: be62a12b-2cad-49a1-a5fa-85f4f3156a7d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: P+TMTqPUB24LPnOZvxaUHoO2pIMQ6WO4i4FfiJkmBaQM/HqE2c+UeT/vdv8opi3sGlhWD8IxMaEJQRGwpTf1wA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: YT3PR01MB5681
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/fJr951sV0Lsg492yrLiJ_aUDwgQ>
Subject: Re: [nfsv4] Comments on minutes of wg meeting at IETF114
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 Sep 2022 02:10:03 -0000

Chuck Lever III wrote:
>David Noveck wrote:
[stuff snipped to just comments related to FreeBSD/me]

>>Let me give people some background.  Chuck objected to the treatment >>of SECINFO in some earlier security-0x draft.  He thought it was to >>complicated so we agreed that he would publish his approach, as he did >>in rpc- tls-pseudoflavors and I  would refer to that in the next security draft.
>>
>>Now it appears that Chuck has changed his mind and I'd appreciate >>knowing why<http://why.ch/>.
>
>Rick told me he is not going to implement it.
This statement sounds somewhat misleading, although true.
I do not see the FreeBSD client implementing pseudo-flavors
because it does not use Secinfo/SecinfoNoName and I doubt
it ever will.
--> It just considers NFS4ERR_WRONGSEC to be a fatal error
      that it maps to EACCES.

The FreeBSD NFSv4 server could easily implement pseudo-flavors.
I was just waiting to see if there was a consensus that it was
the correct way to go.  I'll admit I do not see that consensus
at this time.

> Trond stated that the proposed mechanism is a hack, which I take to mean > he will not accept it in the Linux client.
It would be nice to find out what he thinks is appropriate?

[more stuff snipped]
>Rick says he plans to implement a simple rejection of RPCs when a server’s >security policy does not permit AUTH_SYS without TLS, using existing RPC >or upper layer status code. The client can decide to retry with TLS (why was >it not defaulting to TLS in the first place?) or let such requests fail.
The current FreeBSD NFSv4 server implementation includes two per
file system export restrictions:
- The client must use RPC-over-TLS.
- The client must use RPC-over-TLS and provide a X.509 certificate
  that verifies during TLS handshake.

For both of the above cases, if the client does not satisfy the requirement,
NFS4ERR_WRONGSEC is replied. This was anticipating that there would
be pseudo-flavors for Secinfo/SecinfoNoname that the client (not the
FreeBSD one) could use to determine why NFS4ERR_WRONGSEC was
replied.
--> This can easily be changed since the only RPC-over-TLS client
      currently shipping (FreeBSD) does not depend on this error.

>That seems like a sensible implementation to me.  However, it is not >complete and does not address the fundamental problem, that rpc-with-tls >makes SECINFO, as defined in RFCs 7530 and 8881 essentially useless.  It >was built when Auth flavors alone defined security capabilities and that is >no longer the case 😀.
>
>I’d like Rick to write a brief description of his idea.
As above, I was anticipating implementation of pseudo-flavors in the
FreeBSD server and see no problem with them.

It just so happens, the FreeBSD client does not find Secinfo useful,
but that is just one case (which could change some day).  It is
mostly an implementation issue, where there is no way to easily
keep track of "per server file system" semantics in the NFSv4 client.
(They are either "per file" or "per mount".)

>I think I  am getting the implementation idea.  We have to reach a >consensus on the future of SECINFO.  I hope nobody objects to augmenting >it with pseudoflavors because I object strongly to leaving it almost useless >and explaining that in rfc5661bis.
>
>Rick and Trond have already rejected the use of pseudoflavors.
W.r.t. Rick, not exactly, as above.

>Please explain what you mean by "leaving SECINFO useless". If a SECINFO >response lists AUTH_SYS and the server rejects a subsequent unprotected >AUTH_SYS request with AUTH_TOO_WEAK, the client can retry with >AUTH_SYS on a protected transport. If it doesn't have RPC-with-TLS >available, the unprotected request fails.
At this time the FreeBSD server replies NFS4ERR_WRONGSEC for NFSv4
and AUTH_TOO_WEAK for NFSv3 but, as noted above, that can easily
be changed.

rick
[more stuff snipped]