Re: [nfsv4] Thinking about an RFC5661bis.

Chuck Lever <chuck.lever@oracle.com> Thu, 28 February 2019 17:09 UTC

Return-Path: <chuck.lever@oracle.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E1AE2130EB2 for <nfsv4@ietfa.amsl.com>; Thu, 28 Feb 2019 09:09:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.301
X-Spam-Level:
X-Spam-Status: No, score=-4.301 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=oracle.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JqrnBDvnwgTX for <nfsv4@ietfa.amsl.com>; Thu, 28 Feb 2019 09:09:47 -0800 (PST)
Received: from userp2130.oracle.com (userp2130.oracle.com [156.151.31.86]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 390FB130E9F for <nfsv4@ietf.org>; Thu, 28 Feb 2019 09:09:47 -0800 (PST)
Received: from pps.filterd (userp2130.oracle.com [127.0.0.1]) by userp2130.oracle.com (8.16.0.27/8.16.0.27) with SMTP id x1SH3gJl062577; Thu, 28 Feb 2019 17:09:46 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=content-type : mime-version : subject : from : in-reply-to : date : cc : content-transfer-encoding : message-id : references : to; s=corp-2018-07-02; bh=m9RRajEM5/8sgTVTjFCj1Ysc/FHy9oXfJo3f0Knd+ws=; b=ywNBMOQPFhEYpnWGAcTQBQ0owISpG/Xd92QXx6Tmkl2QQRV82ao6Vs6VoJNfNOLMOEIR TcQSbSNt32iTli80NhQIqvbSTMYuHVRpqouqOvjiPWQQaRI09FAgl/SPQLVtcq/HcAtU ugb6ASZF/7tjFHQHyVpmiRRsxhfhducPpum/FZJJnnSsjnEHjxMQ+m9fvwsZDt6Cgbho drw6yMqwsJ3PLllj3DW+gl+3HkDVXxeoofYK6OMRoPkM5m2FE4zzK/qG5+wK8qCn1Mfr txNQO33pz2Xu7jk+IsDOSPr8hwddtkKll8V4qScxDGdATtqCax7SRuAzc3/CX9tW5EPd GA==
Received: from userv0022.oracle.com (userv0022.oracle.com [156.151.31.74]) by userp2130.oracle.com with ESMTP id 2qtwkujeut-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 28 Feb 2019 17:09:45 +0000
Received: from userv0122.oracle.com (userv0122.oracle.com [156.151.31.75]) by userv0022.oracle.com (8.14.4/8.14.4) with ESMTP id x1SH9jWB002308 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 28 Feb 2019 17:09:45 GMT
Received: from abhmp0005.oracle.com (abhmp0005.oracle.com [141.146.116.11]) by userv0122.oracle.com (8.14.4/8.14.4) with ESMTP id x1SH9jcO007327; Thu, 28 Feb 2019 17:09:45 GMT
Received: from [172.17.16.238] (/63.138.96.7) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 28 Feb 2019 09:09:44 -0800
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 12.2 \(3445.102.3\))
From: Chuck Lever <chuck.lever@oracle.com>
In-Reply-To: <CADaq8je5pzF7m+4oVCNfSeeBDQ98kBwAdCN_o1hBrfDob=SBaA@mail.gmail.com>
Date: Thu, 28 Feb 2019 12:09:42 -0500
Cc: NFSv4 <nfsv4@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <A37CB4B9-F445-4A9A-9347-DA4976F053E9@oracle.com>
References: <CADaq8je5pzF7m+4oVCNfSeeBDQ98kBwAdCN_o1hBrfDob=SBaA@mail.gmail.com>
To: David Noveck <davenoveck@gmail.com>
X-Mailer: Apple Mail (2.3445.102.3)
X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=9181 signatures=668685
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1902280117
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/ksuZjWZ3xhMT5FTR32YHBsiWs0s>
Subject: Re: [nfsv4] Thinking about an RFC5661bis.
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2019 17:09:49 -0000


> On Feb 28, 2019, at 9:37 AM, David Noveck <davenoveck@gmail.com> wrote:
> 
> A number of review comments regarding draft-ietf-nfsv4-mv1-msns-update have raised the issue of a possible bis document for NFSv4.1.   These range all the way from those assuming that mv1-msns-update is a stepping stone on the way to the bis document, which I agree with, to those that are asking us to explain why we haven't already done that..   I will have to respond to that latter comment, but I'm hoping to delay that until after the telechat.
> 
> In any case, it seems that we have accumulated enough changes to and issues with RFC5661 that we need to start thinking about producing a bis document.  These include:
> 	• All the material in mv1-msns-update modiying Section 11 and other parts of RFC5661.
> 	• The need to replace Section 14 (Internationalization) of RFC5661 with something like Section 12 of RFC7530.
> 	• Revising Section 2.4 of RFC5661 so it no longer contradicts RFC8178.
> 	• Updating Section 12 of RFC5661 to be in line with RFC8434.
> 	• Reflecting all of the verified RFC5661 erratta.  There were seventeen last time I checked.  There may also be things discussed as possible erratta, that were considered to big for the erratta process, but could be done as part of a bis document.
> If anyone knows of other material that should go into such a document, or has concerns about the working group starting on this, now is a good time to raise your issue on the list.

I agree that a bis would be very helpful for potential
implementers, and there is enough backlog to warrant
the effort. Before proceeding we need to reach a
consensus that our current charter supports this work.


> The joker in this particular pack is the Security Considerations section.   While we have to address the Security Directorate's notorious, "collection of random observations" comment, I think we need to do so in a way that is compatible with the expected draft-nfsv4-rpc-tls (hint, hint), even though we want to be able to publish without waiting for rpc-tls to become an RFC.  While draft-cel-rpc-tls-02 states that use of AUTH_SYS is currently "discouraged" and that is a fair summary, I don't think RF5661 ever does that explicitly.   It may be that we will need to explicitly discourage use of AUTH_SYS  in an rfc5661bis (without, I hope, going so far as "SHOULD NOT").  I think we need to frame the discussion around the three big security deficits present using AUTH_SYS in the clear (exposing your data to prying eves, using  data that has traversed the newtwork without integrity protection, acting on unauthenticated requests) and not on the use of AUTH_SYS per se.  If we do this, we can publish and implement rpc-tls without needng to further deal with the security considerations section of the NFSv4.1 spec.
> _______________________________________________
> nfsv4 mailing list
> nfsv4@ietf.org
> https://www.ietf.org/mailman/listinfo/nfsv4

--
Chuck Lever