Re: [nfsv4] draft-quigley-nfsv4-labeled-00 - some comments

Jarrett Lu <jarrett.lu@oracle.com> Thu, 07 April 2011 17:23 UTC

Return-Path: <jarrett.lu@oracle.com>
X-Original-To: nfsv4@core3.amsl.com
Delivered-To: nfsv4@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 740053A6954 for <nfsv4@core3.amsl.com>; Thu, 7 Apr 2011 10:23:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wZOHbXcbVzFD for <nfsv4@core3.amsl.com>; Thu, 7 Apr 2011 10:23:33 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 360573A694F for <nfsv4@ietf.org>; Thu, 7 Apr 2011 10:23:33 -0700 (PDT)
Received: from acsinet15.oracle.com (acsinet15.oracle.com [141.146.126.227]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p37HPDpX021417 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 7 Apr 2011 17:25:14 GMT
Received: from acsmt356.oracle.com (acsmt356.oracle.com [141.146.40.156]) by acsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p37HPBvb029693 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 7 Apr 2011 17:25:12 GMT
Received: from abhmt004.oracle.com (abhmt004.oracle.com [141.146.116.13]) by acsmt356.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p37HPBhC015820; Thu, 7 Apr 2011 12:25:11 -0500
Received: from [10.132.148.74] (/10.132.148.74) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 07 Apr 2011 10:25:11 -0700
Message-ID: <4D9DF43E.8070100@oracle.com>
Date: Thu, 07 Apr 2011 10:28:30 -0700
From: Jarrett Lu <jarrett.lu@oracle.com>
User-Agent: Mozilla/5.0 (X11; U; SunOS i86pc; en-US; rv:1.9.2.13) Gecko/20110117 Thunderbird/3.1.7
MIME-Version: 1.0
To: Nico Williams <nico@cryptonector.com>
References: <4D95842E.70708@oracle.com> <4D95B41C.70509@oracle.com> <7C4DFCE962635144B8FAE8CA11D0BF1E03E5EF1DC2@MX14A.corp.emc.com> <4D9DBC25.7000409@oracle.com> <BANLkTinQ+qtGOeW=_MQbOiCUWdRiPg70hw@mail.gmail.com> <4D9DEAF3.2050000@oracle.com> <BANLkTi=_=cdXG-LNTTAkg9Hyr+kj2q0DMQ@mail.gmail.com>
In-Reply-To: <BANLkTi=_=cdXG-LNTTAkg9Hyr+kj2q0DMQ@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Source-IP: acsmt356.oracle.com [141.146.40.156]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090207.4D9DF378.01C9:SCFSTAT5015188,ss=1,fgs=0
Cc: sfaibish@popimap.lss.emc.com, kathleen.moriarty@emc.com, nfsv4@ietf.org
Subject: Re: [nfsv4] draft-quigley-nfsv4-labeled-00 - some comments
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: jarrett.lu@oracle.com
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/nfsv4>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Apr 2011 17:23:34 -0000

On 04/ 7/11 10:07 AM, Nico Williams wrote:
> On Thu, Apr 7, 2011 at 11:48 AM, Jarrett Lu<jarrett.lu@oracle.com>  wrote:
>> On 04/ 7/11 07:43 AM, Nico Williams wrote:
>>> Surely you agree with me that the server needs to know the subject's
>>> label and that we want something better than a single label
>>> per-principal, no?
>> Yes, RPCSEC_GSSv3 will be great. It offers so many goodies. Other
>> than fine grained subject label, it can also be used to convey privileges
>> and privilege set, which could be very useful information among like
>> systems.
>>
>> RPCSEC_GSSv3 is considered a related but separate piece from NFS
>> MAC label extensions. So it's great to have but not required, i.e. we
>> should be able to do labeled NFS without RPCSEC_GSSv3. Again, I'd
>> love to have both.
> "Is considered"?  By whom?  I consider it a requirement for some of
> the cases where both, the client and the server are MAC-aware
> (specifically: whenever you need support for label sets or ranges,
> which is generally the case in MLS deployments for example).  (But
> clearly not a requirement for the cases where either or both of the
> client and server are MAC-unaware.)

I got the impression from the WG meeting session that RPCSEC_GSSv3
is related but separate from labeled NFS. Can others chime in on this?
I also think about this "requirement" in terms of dependency, e.g. does
NFS MAC label extension depends on RPCSEC_GSSv3? Is the extension
useless with RPCSEC_GSSv3? My opinion is labeled NFS works best with
RPCSEC_GSSv3. It can also work, in a less secure or less expressive way,
absent of RPCSEC_GSSv3. For example, a MAC server may need to do
some mapping to get client's subject label.

- Jarrett

> Nico
> --