[nfsv4] Re: RFC: atomically acquiring some attributes for the posix-acls extension
Mark Liam Brown <brownmarkliam@gmail.com> Thu, 08 August 2024 21:52 UTC
Return-Path: <brownmarkliam@gmail.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 68515C14CEE4 for <nfsv4@ietfa.amsl.com>; Thu, 8 Aug 2024 14:52:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.109
X-Spam-Level:
X-Spam-Status: No, score=-2.109 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6NRs0sWfAjS7 for <nfsv4@ietfa.amsl.com>; Thu, 8 Aug 2024 14:52:28 -0700 (PDT)
Received: from mail-pj1-x102e.google.com (mail-pj1-x102e.google.com [IPv6:2607:f8b0:4864:20::102e]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0CEC8C14F6A1 for <nfsv4@ietf.org>; Thu, 8 Aug 2024 14:52:28 -0700 (PDT)
Received: by mail-pj1-x102e.google.com with SMTP id 98e67ed59e1d1-2cb510cd097so1203483a91.1 for <nfsv4@ietf.org>; Thu, 08 Aug 2024 14:52:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1723153947; x=1723758747; darn=ietf.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=jLm2K01SrqbZ7ApI3kFIRzh3o2r2CLC2asmC1DhSMyk=; b=hWeLdpvONGpXCcvW7e0jmXEQUJljrwv76JKCfUP3u8M6iCmd/uY/uaYP9vIvSJ8y9r b2ZNKIoYNXq+D7D5oUBalFXfJe3m7F1FHkm6DySiQ1On6b9ZHUPxXZUjeQ8+AVXIswQR SZnZ8ZTFmOF3wxmuxUxHZQCH/PV8v+OuQbg/sJilyBdqOAS2upHcmKQiPO1VphCL9WnM 67mbtzAc3cdFzMCOBY69wUNi0USGaZdVDGJWopn9xUip7PSNLPFyiP9Dx4gQ7maKmFPf AOeRaxe05/KcPKtuGjif9PO6eQJelM6UhAAXPnINq660AdBB3UQsXFaqi1+dSB7FJMFS 45bw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1723153947; x=1723758747; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=jLm2K01SrqbZ7ApI3kFIRzh3o2r2CLC2asmC1DhSMyk=; b=tiU/4TQMMcor/zLj8nKtgaJrxNQzpVJGjKchKfZKfQ0hgK8FS4H7WNLxqCil8MzxP6 uk/veyYCx8H3+4l6YuotfEg/poH0wZgwnAxiGekCpSMNd+yJyakzvDaq/q0xNXqwHvnB ClXZgVC26FEPfe+0FbqowwmdWYdAfVVf4uzJbkv/hJeFJJT2k9bhdfRCIKDhOzx+WJ7s c4wmOAFeuhdiYzocykkNlOzi47bh9TWvCWES27oWRNdfN5yxSFVUE4BbhX6led2eJUxl v1WvDvxbEobpIyN++5cL30Gz0otzQBt9g70CTLYis1C+q9Ku48leTZvIopMfO8el+B70 oErQ==
X-Gm-Message-State: AOJu0YyRKS6UxAADAXpvnibi3sj+Ap7mSZ8dsgd6ahkf9AuU+g5m0CIw Vk9YuBCaascljWCrbEz3AktxKA7YI1RdFF61EJpoCzPhWQzXUFih33MyOzmGTsYp1gxGKsb/GsN LNOHdNTQp+/k40OYFs/eEmVrViPCcy1Q/
X-Google-Smtp-Source: AGHT+IEuJ+Z1zLALsZfNbWMEoJrRKsE5IG/Q3kRraPo/FlMUsfkuXZdtUiqweWgHkYAx6CXWK+iPBCnNy3iDCASJNZg=
X-Received: by 2002:a17:90b:50cf:b0:2c9:5c63:29f4 with SMTP id 98e67ed59e1d1-2d1c33e67bdmr4230699a91.25.1723153947113; Thu, 08 Aug 2024 14:52:27 -0700 (PDT)
MIME-Version: 1.0
References: <CAM5tNy5OHG2qjtuZeuK2ZYtrKbrOq_wmYFwRHBcdm7PSH7s3qA@mail.gmail.com>
In-Reply-To: <CAM5tNy5OHG2qjtuZeuK2ZYtrKbrOq_wmYFwRHBcdm7PSH7s3qA@mail.gmail.com>
From: Mark Liam Brown <brownmarkliam@gmail.com>
Date: Thu, 08 Aug 2024 23:51:50 +0200
Message-ID: <CAN0SSYy7qQ=Ndk1+GxpAfYzSSe2xRQ8rhjj9Wu=0qXYYe-qjFQ@mail.gmail.com>
To: Rick Macklem <rick.macklem@gmail.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Message-ID-Hash: M2F74WZ46EV2TX7KY2GITRVDVORHNXF3
X-Message-ID-Hash: M2F74WZ46EV2TX7KY2GITRVDVORHNXF3
X-MailFrom: brownmarkliam@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-nfsv4.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: NFSv4 <nfsv4@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [nfsv4] Re: RFC: atomically acquiring some attributes for the posix-acls extension
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/ioh1s2tivrjfrxmNmHodsVGaeG0>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Owner: <mailto:nfsv4-owner@ietf.org>
List-Post: <mailto:nfsv4@ietf.org>
List-Subscribe: <mailto:nfsv4-join@ietf.org>
List-Unsubscribe: <mailto:nfsv4-leave@ietf.org>
On Thu, Aug 8, 2024 at 10:15 PM Rick Macklem <rick.macklem@gmail.com> wrote: > > Hi, > > As some will already know, I am working on a draft that > proposes an extension to 4.2 related to POSIX ACLs which > adds 4 new attributes. > > I have run into a case where specifying the GETATTR return > some ACL related attributes "atomically". By atomically, I > mean that no SETATTR by another client is permitted to change > any on the attributes during the GETATTR. > > Some background: > true form - Is the kind of ACL stored on the file object and > used for access permissions. A new attribute called > acl_trueform indicates what the true form is. > It can be ACL_MODEL_NFS4, ACL_MODEL_POSIX_DRAFT or > ACL_MODEL_NONE. Stop. 1. POSIX.1e has been withdrawn, including POSIX.1e ACLs. One of the reasons were security issues 2. POSIX.1e ACLs are only usable on Linux or POSIX-like platforms. They are INCOMPATIBLE to Windows, ZFS and NFSv4 ACLs, and there are no proper or safe translations between them - you lose information when going from NFSv4, ZFS or Windows ACLs, and the reverse translation either causes inaccessible files if the translation is too restrictive, or opens gaping security holes if the translations allows more than the admin intended. Better would be for Linux finally to adopt NFSv4/ZFS-style ACLs, and not cause security nightmares via grafting defunct POSIX.1e ACLs onto everything. Mark -- IT Infrastructure Consultant Windows, Linux
- [nfsv4] RFC: atomically acquiring some attributes… Rick Macklem
- [nfsv4] Re: RFC: atomically acquiring some attrib… Mark Liam Brown
- [nfsv4] Re: RFC: atomically acquiring some attrib… Rick Macklem
- [nfsv4] Re: RFC: atomically acquiring some attrib… David Noveck
- [nfsv4] Re: RFC: atomically acquiring some attrib… Rick Macklem
- [nfsv4] Re: RFC: atomically acquiring some attrib… David Noveck