Re: [nfsv4] I-D Action: draft-ietf-nfsv4-integrity-measurement-02.txt

Chuck Lever <chucklever@gmail.com> Mon, 08 October 2018 16:42 UTC

Return-Path: <chucklever@gmail.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 778FC129BBF for <nfsv4@ietfa.amsl.com>; Mon, 8 Oct 2018 09:42:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id seeD0DXLGIwh for <nfsv4@ietfa.amsl.com>; Mon, 8 Oct 2018 09:42:47 -0700 (PDT)
Received: from mail-io1-xd33.google.com (mail-io1-xd33.google.com [IPv6:2607:f8b0:4864:20::d33]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 481C11286E3 for <nfsv4@ietf.org>; Mon, 8 Oct 2018 09:42:47 -0700 (PDT)
Received: by mail-io1-xd33.google.com with SMTP id m16-v6so12165048ioj.4 for <nfsv4@ietf.org>; Mon, 08 Oct 2018 09:42:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=s08Aw2mWfSM6RL6iIhI9EzoUzBv6I1Ial+vfo0Hf7YA=; b=DuC60lbWoRpYUsGL0R6L/HsepvUTzFNjCPgRFAlt8ewR73rQML1KwoEkh/0u5TwlSn xIbhMmVRv8t+P0TwSqcAN7KOsSvfBUigCEqoah5eJcaqA9nvQhcf6the8hHZyQj+GG+c nc063WtPfKHkEbR3Okp6qbP4RMrCrpEcMoL9GpXB/icJ2Pw7NSY5Vc8H0nMd6Dlq7g1w CCC/w5kHjDxKNJUDMmaCMetzLurqydySNWmcBkMWTQ3ghyzSJyqSBlpy8PJWfxoiP8fe 5YWLfk3Gihk2XvD/HHwdKvqfdI/ogH0bN58v76Fky6YmdG2tVJF+7oIvgq4/l+Gc6mWp fIkQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=s08Aw2mWfSM6RL6iIhI9EzoUzBv6I1Ial+vfo0Hf7YA=; b=sBwRGWFr6YHX2fZERPaQylS9Cdv9MQvfxlWyPoeRmNCO56OU1+ZUyDcseHOKPnN71t H6k1RyenF5kDNht4E5w8URMtY8dcW+nMp2vvgcWx1zc1kFbSDp0zh+Y7dmRRRGRFlx+w gnF3moiMldXCDfc5nIZGmj8r7/CFZcxBCmkRLKtlTDIYTn4jGHtNUH7rsl/mFuCuuSbq JLyHxgOf98VbJ+oSdxD3hKexYPke/fb9d/6PzMg8+KecVpMCB+bgqP/ckaYfGt12WFsr bIbSq7rOLf4SC/LP2j2IqqqSbBInxzLuFSxMnL6EwJ38U3aIuz3w9010Ztk82PkqJD2q y+MA==
X-Gm-Message-State: ABuFfohlD1x63qFsqxQcxUDStAAR7/X0czu5phuedJGo07NHNszR4M5K 1TUiWKaQqGahyJ2n4ZKkT10=
X-Google-Smtp-Source: ACcGV636JbzDP/Nr1Z05iNp9r6emtTTju4kMksyqETqT+Mz2ZAOrPcLDuV5g9JCd3txrOMZ28vRekQ==
X-Received: by 2002:a6b:2c08:: with SMTP id s8-v6mr16766876ios.217.1539016966500; Mon, 08 Oct 2018 09:42:46 -0700 (PDT)
Received: from anon-dhcp-171.1015granger.net (c-68-61-232-219.hsd1.mi.comcast.net. [68.61.232.219]) by smtp.gmail.com with ESMTPSA id k15-v6sm552900itk.8.2018.10.08.09.42.45 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 08 Oct 2018 09:42:45 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
From: Chuck Lever <chucklever@gmail.com>
In-Reply-To: <23D33FE9-54F9-40CB-AC41-23EC15603E47@netapp.com>
Date: Mon, 08 Oct 2018 12:42:44 -0400
Cc: "nfsv4@ietf.org" <nfsv4@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <BACFE07D-B843-485F-97EE-4D36ABAB356F@gmail.com>
References: <153901060913.16390.8389561648327812120@ietfa.amsl.com> <23D33FE9-54F9-40CB-AC41-23EC15603E47@netapp.com>
To: "Everhart, Craig" <Craig.Everhart@netapp.com>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/k7DFNfhOXSfPksgZH45x-KZFV3M>
Subject: Re: [nfsv4] I-D Action: draft-ietf-nfsv4-integrity-measurement-02.txt
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Oct 2018 16:42:49 -0000

Hi Craig -

> On Oct 8, 2018, at 11:48 AM, Everhart, Craig <Craig.Everhart@netapp.com> wrote:
> 
> In the "1. Introduction", the opaque provenance information is described as including a "keyed hash, such as an HMAC [RFC2104]" without any indication as to the management of the key information.  Must that information, also, be taken on faith?  What's the basis for this claim?  Is it required for all provenance information, or just for some?

The Introduction describes that as "out of scope" but suggests key
management can be done via another distribution channel and stored
locally in a Trusted Platform Module.

Section 1.1:
   A Trusted Platform Module [TPM-SUM] can seal the key material used to
   sign and verify file content.  Distributing and protecting such key
   material is outside the scope of the OPTIONAL extension specified in
   this document.


> There's an effort made in this draft to distinguish participating/non-participating clients and servers.  Because this draft really talks about only one kind of provenance information, what is to be done with clients or servers that participate in one but not all kinds of provenance information?

The Introduction states that "participating" clients have to agree on
using the same provenance assessor.
 
Section 1.1:
   NFS acts as a conduit by which file provenance information and file
   content move between storage on an NFS server and the provenance
   assessor where that content is to be accessed.  NFS peers accessing a
   set of shared files must all agree on the at-rest file provenance
   information format.  The format is specified by the provenance
   assessor and is therefore not described in this document.

The document later states that provenance assessors have to be prepared
to encounter unrecognized provenance information.

Section 5.3:
   A provenance assessor on an NFS version 4.2 peer needs to be prepared
   to deal with file provenance information it does not recognize or
   cannot parse.  Typically its policy treats this case as a provenance
   verification failure.

Again, I'm struggling to see the purpose of deploying multiple
incompatible FPI schemas concurrently. Do you have something specific in
mind?


> Apparently, the updating of file content must be done in conjunction with updating of provenance information.  What can be done to make such operations mutually atomic?

I don't believe these "race conditions" are consequential, typically.
While the provenance information does not match the content, assessors
will prevent access to that content.

Moreover, attaching FPI is usually a final step before content distri-
bution, performed separately via a tool. The tool, not the file system
stack, has access to the private signing key.


> What's to be done with a server that wants to vet provenance information, but notices that the stored provenance information is not correct with respect to the stored file content?  Surely there are other, similar, race-like conditions.

NFS servers do not vet the provenance information during remote access
of content. A provenance assessor on the server may prevent access only
to local accessors.

Section 5.3:
   Note that an NFS version 4.2 server may use a provenance assessor to
   prevent access by local users to protected files.  To enable NFS
   version 4.2 clients to do their own assessment, an NFS version 4.2
   server should never prevent remote access to clients if local
   provenance assessment fails.

If the content and FPI are out of sync, local assessment on the server
prevents only local access to that content.

Because FPI is meant to be end-to-end protection, the goal here is to
perform provenance assessment immediately before the content is to be
used. Because it is typically expensive, assessment should be done as
few times as needed (once?) to guarantee protection. No point in having
the server do it and then the client do it again.


> 		Craig
> 
> 
> On 10/8/18, 10:58 AM, "nfsv4 on behalf of internet-drafts@ietf.org" <nfsv4-bounces@ietf.org on behalf of internet-drafts@ietf.org> wrote:
> 
>    A New Internet-Draft is available from the on-line Internet-Drafts directories.
>    This draft is a work item of the Network File System Version 4 WG of the IETF.
> 
>            Title           : File Content Provenance for Network File System version 4
>            Author          : Charles Lever
>            Filename        : draft-ietf-nfsv4-integrity-measurement-02.txt
>            Pages           : 13
>            Date            : 2018-10-08
> 
>    Abstract:
>       This document specifies an OPTIONAL extension to NFS version 4 minor
>       version 2 that enables file provenance information to be conveyed
>       between NFS version 4.2 servers and clients.  File provenance
>       information authenticates the creator of a file's content and helps
>       guarantee the content's integrity from creation to use.
> 
> 
>    The IETF datatracker status page for this draft is:
>    https://datatracker.ietf.org/doc/draft-ietf-nfsv4-integrity-measurement/
> 
>    There are also htmlized versions available at:
>    https://tools.ietf.org/html/draft-ietf-nfsv4-integrity-measurement-02
>    https://datatracker.ietf.org/doc/html/draft-ietf-nfsv4-integrity-measurement-02
> 
>    A diff from the previous version is available at:
>    https://www.ietf.org/rfcdiff?url2=draft-ietf-nfsv4-integrity-measurement-02
> 
> 
>    Please note that it may take a couple of minutes from the time of submission
>    until the htmlized version and diff are available at tools.ietf.org.
> 
>    Internet-Drafts are also available by anonymous FTP at:
>    ftp://ftp.ietf.org/internet-drafts/
> 
>    _______________________________________________
>    nfsv4 mailing list
>    nfsv4@ietf.org
>    https://www.ietf.org/mailman/listinfo/nfsv4
> 
> 
> _______________________________________________
> nfsv4 mailing list
> nfsv4@ietf.org
> https://www.ietf.org/mailman/listinfo/nfsv4

--
Chuck Lever
chucklever@gmail.com