Re: [nfsv4] Stephen Farrell's No Objection on draft-ietf-nfsv4-minorversion2-40: (with COMMENT)

Tom Haynes <thomas.haynes@primarydata.com> Mon, 25 January 2016 23:46 UTC

Return-Path: <thomas.haynes@primarydata.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E72B1A87BB for <nfsv4@ietfa.amsl.com>; Mon, 25 Jan 2016 15:46:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=unavailable
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XI_jnFCxMMIp for <nfsv4@ietfa.amsl.com>; Mon, 25 Jan 2016 15:46:55 -0800 (PST)
Received: from mail-pf0-x22c.google.com (mail-pf0-x22c.google.com [IPv6:2607:f8b0:400e:c00::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 48F501A87BA for <nfsv4@ietf.org>; Mon, 25 Jan 2016 15:46:51 -0800 (PST)
Received: by mail-pf0-x22c.google.com with SMTP id n128so89468191pfn.3 for <nfsv4@ietf.org>; Mon, 25 Jan 2016 15:46:51 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=primarydata-com.20150623.gappssmtp.com; s=20150623; h=content-type:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=y0qBqUbgntvREZKVp6q8kRoXnkLylCQtn+nxcTOtXX8=; b=HCsuFETaU0NeffUcgi3K1Ioi3GPlfOrCT0ZRVSShFmGCJk83+ImUA/d3R+KJok2Gmr biyQcy4dJE+cmJkHlIbL+mPCcNr5l5MTlWq7eQ67QNSgmsaYqS4NNeT+Yzchueljd+/b /hxARyLCPxwwWUvpFD6Tmez+IE3RoPOfL5UfTMAgZMNwmo+9um5H0e0Gya6IGAs+TMZL PFJlubKxYr7q1uvCKcVqhSAwq5PPn8zZ+xPm5UufyPXdGyjHUwJEXkOB3FXJ5yMoWPYr 3iNSuZ9ryZtZHCAo7OZp+qmsr+R0WmnmD6BwYCA3QC3zC0AA6zKMdEVCK84ypl68RMMP zEzQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:message-id:references:to; bh=y0qBqUbgntvREZKVp6q8kRoXnkLylCQtn+nxcTOtXX8=; b=EdKej9Fn0wmLG3vgICfh7ukFhG2YlY8Fmr5rqkwrh3MynH/kUmHTzL0HIdXfx5qmNJ UDK+w2LJNcXY6Zp2grWM1XXG8fGdCUewJbYYk5Fz48DkQFynfCtpdM6xZGpJFvTwpvj8 4FQf7rOGohpwLcVn21N3KoT3VNquXyImuWvtWZV8WhdMPhL89lOzmBpTmbivMVWI12GP +nAlCN1kdc2cGZ0r5E5S2TL3LK/ikDMK393feuxpqY4judULrfSqygdFfmYa5J8axjjI IhIztFHtFGwKHFKeiUOBm9EIDcIh7Bzr/lj8AzShGIJgSiChvQnqchHtaO9Wzq6TSrSl GvrQ==
X-Gm-Message-State: AG10YOQorwEKRxkIB3cElrySPAdeb4uD2lsK7VKtaZEgdul3mPoxcUfxz9GYc+e+THfYsA8r
X-Received: by 10.98.0.66 with SMTP id 63mr29931616pfa.61.1453765610878; Mon, 25 Jan 2016 15:46:50 -0800 (PST)
Received: from kinslayer.corp.primarydata.com (63-157-6-18.dia.static.qwest.net. [63.157.6.18]) by smtp.gmail.com with ESMTPSA id n27sm31131045pfb.53.2016.01.25.15.46.49 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 25 Jan 2016 15:46:50 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_D1C0334A-6CEF-4244-89B3-4E08219441E9"
Mime-Version: 1.0 (Mac OS X Mail 9.2 \(3112\))
From: Tom Haynes <thomas.haynes@primarydata.com>
In-Reply-To: <56A397CB.7060606@cs.tcd.ie>
Date: Mon, 25 Jan 2016 15:46:49 -0800
Message-Id: <9811B1FE-51CA-41D7-8222-EEC056473039@primarydata.com>
References: <20160121141530.8170.25186.idtracker@ietfa.amsl.com> <166532A7-FDCC-4021-8314-8CCD2DB36703@primarydata.com> <56A397CB.7060606@cs.tcd.ie>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>
X-Mailer: Apple Mail (2.3112)
Archived-At: <http://mailarchive.ietf.org/arch/msg/nfsv4/fcnqXA0UquxGX2KTKi4D6v8Ocvc>
Cc: The IESG <iesg@ietf.org>, draft-ietf-nfsv4-minorversion2@ietf.org, NFSv4 <nfsv4@ietf.org>, nfsv4-chairs@ietf.org
Subject: Re: [nfsv4] Stephen Farrell's No Objection on draft-ietf-nfsv4-minorversion2-40: (with COMMENT)
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Jan 2016 23:46:57 -0000

> On Jan 23, 2016, at 7:10 AM, Stephen Farrell <stephen.farrell@cs.tcd.ie> wrote:
> 
> 
> Hi Tom,
> 
> On 23/01/16 00:13, Tom Haynes wrote:
>> Hi Stephen,
>> 
>> Thanks for the comment, responses inline
>> 
>>> On Jan 21, 2016, at 6:15 AM, Stephen Farrell <stephen.farrell@cs.tcd.ie> wrote:
>>> 
>>> Stephen Farrell has entered the following ballot position for
>>> draft-ietf-nfsv4-minorversion2-40: No Objection
>>> 
>>> When responding, please keep the subject line intact and reply to all
>>> email addresses included in the To and CC lines. (Feel free to cut this
>>> introductory paragraph, however.)
>>> 
>>> 
>>> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
>>> for more information about IESG DISCUSS and COMMENT positions.
>>> 
>>> 
>>> The document, along with other ballot positions, can be found here:
>>> https://datatracker.ietf.org/doc/draft-ietf-nfsv4-minorversion2/
>>> 
>>> 
>>> 
>>> ----------------------------------------------------------------------
>>> COMMENT:
>>> ----------------------------------------------------------------------
>>> 
>>> 
>>> 
>>> - 1.3.2: I'm just curious, feel free to ignore. Does anyone
>>> maintain those posix specs these days? (e.g.
>>> [posix_fadvise]).
>> 
>> No clue :-)
>> 
>> 
>>> 
>>> - 1.4: "a new arm" isn't clear to this reader, maybe
>>> consider re-phrasing if this isn't a common NFS term (if it
>>> is, that's fine)
>>> 
>> 
>> 
>> No, not a NFS term.
>> 
>> How about this:
>> 
>>   NFSv4.2, it is possible to add a new arm (i.e., a new entry in the
>>   union and a corresponding new field in the structure) in a subsequent
>>   minor version.  And it is also possible to move such an operation
> 
> That's better (for me) yes, or just refer to rfc1832 maybe
> as Chuck suggested.
> 
>> 
>> 
>> 
>>> - 4.10: thanks for providing all that!
>>> 
>>> - 4.10: possibly dumb question: does this (or NFSv4) support
>>> what a user would perceive as an encrypting file system
>>> where the keys are held-by/derived from something on the
>>> user's machine? If so, and if the two servers involved use
>>> keys known at the user's machine and not by the NFS
>>> infrastructure then I'm not sure how this can work. IOW, if
>>> there's a decryption and then a re-encryption required in a
>>> server-server copy and if that needs any keying material
>>> from the client then could that ever work? Note that I'm not
>>> talking about securing the file during the server-server
>>> copy but de-crypting before sending and then re-encrypting
>>> before storing.
>> 
>> Petty sure that Kerberos provides for this.
> 
> Really? I'd be surprised. That probably means I didn't ask
> the question well though:-)
> 
> Does NFS have any support for an encrypted file system such
> that the long term keys protecting those files can be stored
> e.g. on a usb dongle that the user keeps?


No


> 
> If so, then I doubt server-server copy can work in such cases
> and that probably would need to be documented. If not, then...
> not:-)
> 
>>> - 9.6: Is it considered a requirement that e.g. a user
>>> cleared to secret cannot tell if there is anything stored
>>> that is of higher classification?
>> 
>> 
>> In Section 9.2, it states:
>> 
>>   o  MUST NOT expose an object to either the client or server name
>>      space before its security information has been bound to it.
>> 
>> And the definition of “bound” belongs to
>> the security implementation being defined.
>> 
>> I.e., I mean seLinux, Trusted Solaris, etc.
> 
> Sure, but that's not the issue.
> 
>> 
>> 
>>> If so, did anyone go
>>> through all NFS interfaces to check if e.g. disk or
>>> directory usage information could give away the fact that
>>> there is stuff stored that's not visible to this user?
>> 
>> 
>> In a Limited Server, this is clearly not met.
> 
> That's fine.
> 
>> 
>> In a Full Mode implementation, a policy might exist that
>> allowed the server to let the client make such decisions.
> 
> I'm not sure what decision you mean. The issue I wanted to
> ask about relates to information leakage, not a client
> decision. Let me try as another way.
> 
> Say if a directory has N files labelled secret and one
> file labelled top-secret and a user is cleared to secret.
> Can the user use NFS to check the size of the directory
> and thus deduce the size of the top-secret file? If so,
> then I think you ought note that as a security consideration.
> If not, it'd maybe be worth saying a few words about that
> so that implementers don't get it wrong.


Do the requirements in section 3.6 of RFC 7204 address your concern?


> 
> Cheers,
> S.
> 
>>> I'm
>>> not arguing that this definitely needs to be done
>>> exhaustively, but maybe consider adding a caveat emptor
>>> sentence somewhere saying that even with MAC, it could be
>>> that NFS allows for some minor meta-data leakage such as the
>>> above.