Re: [nfsv4] Stephen Farrell's No Objection on draft-ietf-nfsv4-minorversion2-40: (with COMMENT)
Tom Haynes <thomas.haynes@primarydata.com> Mon, 25 January 2016 23:46 UTC
Return-Path: <thomas.haynes@primarydata.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E72B1A87BB for <nfsv4@ietfa.amsl.com>; Mon, 25 Jan 2016 15:46:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=unavailable
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XI_jnFCxMMIp for <nfsv4@ietfa.amsl.com>; Mon, 25 Jan 2016 15:46:55 -0800 (PST)
Received: from mail-pf0-x22c.google.com (mail-pf0-x22c.google.com [IPv6:2607:f8b0:400e:c00::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 48F501A87BA for <nfsv4@ietf.org>; Mon, 25 Jan 2016 15:46:51 -0800 (PST)
Received: by mail-pf0-x22c.google.com with SMTP id n128so89468191pfn.3 for <nfsv4@ietf.org>; Mon, 25 Jan 2016 15:46:51 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=primarydata-com.20150623.gappssmtp.com; s=20150623; h=content-type:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=y0qBqUbgntvREZKVp6q8kRoXnkLylCQtn+nxcTOtXX8=; b=HCsuFETaU0NeffUcgi3K1Ioi3GPlfOrCT0ZRVSShFmGCJk83+ImUA/d3R+KJok2Gmr biyQcy4dJE+cmJkHlIbL+mPCcNr5l5MTlWq7eQ67QNSgmsaYqS4NNeT+Yzchueljd+/b /hxARyLCPxwwWUvpFD6Tmez+IE3RoPOfL5UfTMAgZMNwmo+9um5H0e0Gya6IGAs+TMZL PFJlubKxYr7q1uvCKcVqhSAwq5PPn8zZ+xPm5UufyPXdGyjHUwJEXkOB3FXJ5yMoWPYr 3iNSuZ9ryZtZHCAo7OZp+qmsr+R0WmnmD6BwYCA3QC3zC0AA6zKMdEVCK84ypl68RMMP zEzQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:message-id:references:to; bh=y0qBqUbgntvREZKVp6q8kRoXnkLylCQtn+nxcTOtXX8=; b=EdKej9Fn0wmLG3vgICfh7ukFhG2YlY8Fmr5rqkwrh3MynH/kUmHTzL0HIdXfx5qmNJ UDK+w2LJNcXY6Zp2grWM1XXG8fGdCUewJbYYk5Fz48DkQFynfCtpdM6xZGpJFvTwpvj8 4FQf7rOGohpwLcVn21N3KoT3VNquXyImuWvtWZV8WhdMPhL89lOzmBpTmbivMVWI12GP +nAlCN1kdc2cGZ0r5E5S2TL3LK/ikDMK393feuxpqY4judULrfSqygdFfmYa5J8axjjI IhIztFHtFGwKHFKeiUOBm9EIDcIh7Bzr/lj8AzShGIJgSiChvQnqchHtaO9Wzq6TSrSl GvrQ==
X-Gm-Message-State: AG10YOQorwEKRxkIB3cElrySPAdeb4uD2lsK7VKtaZEgdul3mPoxcUfxz9GYc+e+THfYsA8r
X-Received: by 10.98.0.66 with SMTP id 63mr29931616pfa.61.1453765610878; Mon, 25 Jan 2016 15:46:50 -0800 (PST)
Received: from kinslayer.corp.primarydata.com (63-157-6-18.dia.static.qwest.net. [63.157.6.18]) by smtp.gmail.com with ESMTPSA id n27sm31131045pfb.53.2016.01.25.15.46.49 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 25 Jan 2016 15:46:50 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_D1C0334A-6CEF-4244-89B3-4E08219441E9"
Mime-Version: 1.0 (Mac OS X Mail 9.2 \(3112\))
From: Tom Haynes <thomas.haynes@primarydata.com>
In-Reply-To: <56A397CB.7060606@cs.tcd.ie>
Date: Mon, 25 Jan 2016 15:46:49 -0800
Message-Id: <9811B1FE-51CA-41D7-8222-EEC056473039@primarydata.com>
References: <20160121141530.8170.25186.idtracker@ietfa.amsl.com> <166532A7-FDCC-4021-8314-8CCD2DB36703@primarydata.com> <56A397CB.7060606@cs.tcd.ie>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>
X-Mailer: Apple Mail (2.3112)
Archived-At: <http://mailarchive.ietf.org/arch/msg/nfsv4/fcnqXA0UquxGX2KTKi4D6v8Ocvc>
Cc: The IESG <iesg@ietf.org>, draft-ietf-nfsv4-minorversion2@ietf.org, NFSv4 <nfsv4@ietf.org>, nfsv4-chairs@ietf.org
Subject: Re: [nfsv4] Stephen Farrell's No Objection on draft-ietf-nfsv4-minorversion2-40: (with COMMENT)
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Jan 2016 23:46:57 -0000
> On Jan 23, 2016, at 7:10 AM, Stephen Farrell <stephen.farrell@cs.tcd.ie> wrote: > > > Hi Tom, > > On 23/01/16 00:13, Tom Haynes wrote: >> Hi Stephen, >> >> Thanks for the comment, responses inline >> >>> On Jan 21, 2016, at 6:15 AM, Stephen Farrell <stephen.farrell@cs.tcd.ie> wrote: >>> >>> Stephen Farrell has entered the following ballot position for >>> draft-ietf-nfsv4-minorversion2-40: No Objection >>> >>> When responding, please keep the subject line intact and reply to all >>> email addresses included in the To and CC lines. (Feel free to cut this >>> introductory paragraph, however.) >>> >>> >>> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html >>> for more information about IESG DISCUSS and COMMENT positions. >>> >>> >>> The document, along with other ballot positions, can be found here: >>> https://datatracker.ietf.org/doc/draft-ietf-nfsv4-minorversion2/ >>> >>> >>> >>> ---------------------------------------------------------------------- >>> COMMENT: >>> ---------------------------------------------------------------------- >>> >>> >>> >>> - 1.3.2: I'm just curious, feel free to ignore. Does anyone >>> maintain those posix specs these days? (e.g. >>> [posix_fadvise]). >> >> No clue :-) >> >> >>> >>> - 1.4: "a new arm" isn't clear to this reader, maybe >>> consider re-phrasing if this isn't a common NFS term (if it >>> is, that's fine) >>> >> >> >> No, not a NFS term. >> >> How about this: >> >> NFSv4.2, it is possible to add a new arm (i.e., a new entry in the >> union and a corresponding new field in the structure) in a subsequent >> minor version. And it is also possible to move such an operation > > That's better (for me) yes, or just refer to rfc1832 maybe > as Chuck suggested. > >> >> >> >>> - 4.10: thanks for providing all that! >>> >>> - 4.10: possibly dumb question: does this (or NFSv4) support >>> what a user would perceive as an encrypting file system >>> where the keys are held-by/derived from something on the >>> user's machine? If so, and if the two servers involved use >>> keys known at the user's machine and not by the NFS >>> infrastructure then I'm not sure how this can work. IOW, if >>> there's a decryption and then a re-encryption required in a >>> server-server copy and if that needs any keying material >>> from the client then could that ever work? Note that I'm not >>> talking about securing the file during the server-server >>> copy but de-crypting before sending and then re-encrypting >>> before storing. >> >> Petty sure that Kerberos provides for this. > > Really? I'd be surprised. That probably means I didn't ask > the question well though:-) > > Does NFS have any support for an encrypted file system such > that the long term keys protecting those files can be stored > e.g. on a usb dongle that the user keeps? No > > If so, then I doubt server-server copy can work in such cases > and that probably would need to be documented. If not, then... > not:-) > >>> - 9.6: Is it considered a requirement that e.g. a user >>> cleared to secret cannot tell if there is anything stored >>> that is of higher classification? >> >> >> In Section 9.2, it states: >> >> o MUST NOT expose an object to either the client or server name >> space before its security information has been bound to it. >> >> And the definition of “bound” belongs to >> the security implementation being defined. >> >> I.e., I mean seLinux, Trusted Solaris, etc. > > Sure, but that's not the issue. > >> >> >>> If so, did anyone go >>> through all NFS interfaces to check if e.g. disk or >>> directory usage information could give away the fact that >>> there is stuff stored that's not visible to this user? >> >> >> In a Limited Server, this is clearly not met. > > That's fine. > >> >> In a Full Mode implementation, a policy might exist that >> allowed the server to let the client make such decisions. > > I'm not sure what decision you mean. The issue I wanted to > ask about relates to information leakage, not a client > decision. Let me try as another way. > > Say if a directory has N files labelled secret and one > file labelled top-secret and a user is cleared to secret. > Can the user use NFS to check the size of the directory > and thus deduce the size of the top-secret file? If so, > then I think you ought note that as a security consideration. > If not, it'd maybe be worth saying a few words about that > so that implementers don't get it wrong. Do the requirements in section 3.6 of RFC 7204 address your concern? > > Cheers, > S. > >>> I'm >>> not arguing that this definitely needs to be done >>> exhaustively, but maybe consider adding a caveat emptor >>> sentence somewhere saying that even with MAC, it could be >>> that NFS allows for some minor meta-data leakage such as the >>> above.
- [nfsv4] Stephen Farrell's No Objection on draft-i… Stephen Farrell
- Re: [nfsv4] Stephen Farrell's No Objection on dra… Tom Haynes
- Re: [nfsv4] Stephen Farrell's No Objection on dra… Chuck Lever
- Re: [nfsv4] Stephen Farrell's No Objection on dra… Stephen Farrell
- Re: [nfsv4] Stephen Farrell's No Objection on dra… Benjamin Kaduk
- Re: [nfsv4] Stephen Farrell's No Objection on dra… Stephen Farrell
- Re: [nfsv4] Stephen Farrell's No Objection on dra… Tom Haynes