Re: [nfsv4] Adoption call for draft-dnoveck-nfsv4-security
Chuck Lever III <chuck.lever@oracle.com> Sat, 15 October 2022 21:15 UTC
Return-Path: <chuck.lever@oracle.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CD74FC14F74C; Sat, 15 Oct 2022 14:15:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.806
X-Spam-Level:
X-Spam-Status: No, score=-2.806 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=oracle.com header.b=1ziPwZ1J; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.b=uupaaDj1
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MAGIJYJM7SmV; Sat, 15 Oct 2022 14:15:38 -0700 (PDT)
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com [205.220.177.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D2417C14F73A; Sat, 15 Oct 2022 14:15:37 -0700 (PDT)
Received: from pps.filterd (m0246630.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 29FIvqBM007051; Sat, 15 Oct 2022 21:15:36 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=corp-2022-7-12; bh=5YtJYXBNbUA2wRonSSJqvZQ5JQ1fl1DB2LNKqLXuK3k=; b=1ziPwZ1JsYpTwR6L7PzbFeRAx7GAzWoWm+37DsStgcdRSypmLt4+GV0qC1d3OJPEAm1T tEOqNIceKEkGBJhgFkawUZ85qq2rqsOMgh+Kx5+9GWKeKl/BsUxAGz2ERDI7Sata9reI eJoN2yLWhl3ce6eDcMLYypG1TLyWWZXJs+TTaRBr9MCY30S3eDhlgLAlv05nx0MbVzNG cUKTWJJffX2B/icCOeY3b7IPAYXT32gFyn6uuMO1d0QpEtnIbMZyFBwkdVbYOlyKvec3 MOs3RuBNSORSRfg1prnnaDTfuAx7fybqgkLN1U3t+2JP+rCvyjnfcuV+DaH4YTpW5I29 Jw==
Received: from iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta01.appoci.oracle.com [130.35.100.223]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 3k7rgn8ncm-2 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Sat, 15 Oct 2022 21:15:36 +0000
Received: from pps.filterd (iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (8.17.1.5/8.17.1.5) with ESMTP id 29FBsiOk005334; Sat, 15 Oct 2022 21:10:40 GMT
Received: from nam10-bn7-obe.outbound.protection.outlook.com (mail-bn7nam10lp2105.outbound.protection.outlook.com [104.47.70.105]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 3k7ka8g58f-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Sat, 15 Oct 2022 21:10:40 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=F8+3K7v5pDmuhWx2Y9VrqouM3gRSbdpXf+cibkJgxXfvhKxxaJhj16cr/mLcMBPo/SOYRasYj/Ip+KmH66DRfvnsIMNJ6MAk4fcQVlFSKA2G3WEeY4UWjGJ0MKaiYBeoBTsPclHXPgeA/oHZgAqx/0Q2N9tWFs1X4JI9FqzirHpgy14uzhKBR0CqGfw85RtuLbwoRCYS+lDdGpe1HKWpSIMEG+uMilcjL2nPhqQLu2oA3p6dH5qWUId46O5DudktlwCQf0EhE7909qnPmSQpF9x/cEVbp5iU741FS9uRYC0JNFRSWS/R/Z+Era9NLI94nqqYtosAwvKoKqrcfMHn2Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=5YtJYXBNbUA2wRonSSJqvZQ5JQ1fl1DB2LNKqLXuK3k=; b=W3gvP6+pyNdKyS2foCIfYLvQ2rVPtLItzMN+jSAFR4DAGktT77yg9yry7aeeqJdct3IoLhIrNwLATYjGDtQJOfwIJrf03gMN724VCWBAtWLmZ/Vwo+qFZ2cLS1PvD6XWjtgSJ/zPK1psFXPrKzhS9mMVC0ZchZ7E3rQ9M/znZoGiSKteCnUON8+jWWJjdpXrBk/tXoh1NfR11HJ6lwQSvDMZds73SW+UFlWrBkMu9LUli0kAEuByQ5kPDbFrK9n6HqDYq4WI0aPdOgUpOHbIxEzMB/YEYtLg96FisWSuOjYrBz3cD8SRxOVx/jHHyxWf2QU+WidkKhLGIEogqT4R9g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=5YtJYXBNbUA2wRonSSJqvZQ5JQ1fl1DB2LNKqLXuK3k=; b=uupaaDj1WFUP1szFPAgOqqFF+ZJZ8DFOyiGMgYFmd4tQtWiLT+0lz0itjulCY0elmuHOVn0Mh/hMZJk+jBp5j4PliTiB5vwKwVi0dgR9vsuFLkiWxUZSWj8dH6fVdT6yZ/kJuw7tLOzdlZ6F8cZvqKpcc4e/nARQgzU4Ham1Kxg=
Received: from BN0PR10MB5128.namprd10.prod.outlook.com (2603:10b6:408:117::24) by SN4PR10MB5607.namprd10.prod.outlook.com (2603:10b6:806:20a::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5723.29; Sat, 15 Oct 2022 21:10:35 +0000
Received: from BN0PR10MB5128.namprd10.prod.outlook.com ([fe80::5403:3164:f6c3:d48a]) by BN0PR10MB5128.namprd10.prod.outlook.com ([fe80::5403:3164:f6c3:d48a%4]) with mapi id 15.20.5723.029; Sat, 15 Oct 2022 21:10:35 +0000
From: Chuck Lever III <chuck.lever@oracle.com>
To: NFSv4 <nfsv4@ietf.org>
CC: nfsv4-chairs <nfsv4-chairs@ietf.org>, "nfsv4-ads@ietf.org" <nfsv4-ads@ietf.org>
Thread-Topic: [nfsv4] Adoption call for draft-dnoveck-nfsv4-security
Thread-Index: AQHY3y6wlOUuB/Bl90GexajozyiG7a4NLnKAgALIUQA=
Date: Sat, 15 Oct 2022 21:10:35 +0000
Message-ID: <AE6831C3-D92B-42B3-93B1-6D2B1B3ECC51@oracle.com>
References: <CADaq8jfi1ApVZeJ6LsGSPY=kRXQ2W_NZ9ixwcOnJJ-A_RH4SPA@mail.gmail.com> <E93D76F0-3604-41ED-A240-60D93C2FA107@gmail.com>
In-Reply-To: <E93D76F0-3604-41ED-A240-60D93C2FA107@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3696.120.41.1.1)
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN0PR10MB5128:EE_|SN4PR10MB5607:EE_
x-ms-office365-filtering-correlation-id: fb6c2417-8252-40a7-3ce6-08daaef1b3f4
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN0PR10MB5128.namprd10.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(366004)(136003)(39860400002)(376002)(396003)(346002)(451199015)(478600001)(6486002)(966005)(66446008)(64756008)(66556008)(66476007)(8936002)(41300700001)(6512007)(5660300002)(33656002)(26005)(2906002)(4326008)(8676002)(76116006)(71200400001)(36756003)(66946007)(38070700005)(83380400001)(91956017)(316002)(2616005)(450100002)(53546011)(38100700002)(6506007)(86362001)(15650500001)(186003)(6916009)(122000001)(54906003)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="us-ascii"
Content-ID: <6516FD54CF4C8B4A85FB0107C0D6B6E3@namprd10.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN0PR10MB5128.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: fb6c2417-8252-40a7-3ce6-08daaef1b3f4
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Oct 2022 21:10:35.5202 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: J2T9uSY04XF4iSgdjJpykxKfalXP27yU8KJ2ZKZLU/yVHLSRUVPgGDYlzC+n6Ftv+T4nn531/3WNQaNVZTGsmw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN4PR10MB5607
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.895,Hydra:6.0.545,FMLib:17.11.122.1 definitions=2022-10-15_14,2022-10-14_01,2022-06-22_01
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 adultscore=0 suspectscore=0 spamscore=0 mlxlogscore=999 phishscore=0 mlxscore=0 malwarescore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2209130000 definitions=main-2210150128
X-Proofpoint-GUID: pqCUMF9zGh0X3hEkEq4BjL9QPuNJjmWX
X-Proofpoint-ORIG-GUID: pqCUMF9zGh0X3hEkEq4BjL9QPuNJjmWX
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/n_oXLCrIZ01CWptQFVOBV8ZOQMc>
Subject: Re: [nfsv4] Adoption call for draft-dnoveck-nfsv4-security
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 15 Oct 2022 21:15:43 -0000
> On Oct 13, 2022, at 10:41 PM, Thomas Haynes <loghyr@gmail.com> wrote: > >> On Oct 13, 2022, at 11:07 AM, David Noveck <davenoveck@gmail.com> wrote: >> >> This is an adoption call for draft-dnoveck-nfsv4-security. >> >> This document describes nfsv4 security for all nfsv4 minor versions. It was written as part of rfc5661bis effort and is intended to result in a standards-track document. PAs stated in the abstract: > > > First impressions: > > This document is huge - I thought we agreed to no longer do large WG documents? > > There are a log of author notes - it does not appear to be a close to finished document. The amount of remaining work makes me reluctant to agree to adoption at this time, as I've stated before. In addition, the document size and amount of remaining work makes me skeptical of the precision of the proposed milestone dates. I don't see any impediment to completing most or all of the noted pending tasks while the document is still a personal draft. > Who has agreed to do the changes in their implemementations? I.e., security is important, but which vendors have agreed to make changes in their v4.0, v4.1, and v4.2 product implementations? I agree: if implementers / vendors are not on board with any protocol changes proposed in the bis cluster, we need to pause. This is exactly why I requested that new protocol be removed from nfsv4-security -- the work needed to assess interoperability and determine interest amongst vendors in adopting these changes is significant and time-consuming. Efforts to address errata and other minor spec problems should not be held up by that work. Removing protocol that implementations already do not use does not have the same interoperability/vendor-interest challenges. When removing unused protocol, essentially that part of the effort has already been done. In addition, my impression was that there are no changes permitted to NFSv4.0 and NFSv4.1 at this time. The document's editor has proposed an alternate approach of constructing an NFSv4.2-only extension for some of the proposed protocol changes. Although as far as I am aware, it is the only approach sanctioned by RFC 8178, I still prefer that to proceed outside the scope of rfc5661bis for exactly the reasons above. > To be fair, I would have defined the security issue with NFSv4 to be AUTH_SYS versus other models. I would not have dragged in Labeled NFS, ACLS, OPEN, etc. To date, there has been only one complainant that there are problems in these areas, and to my knowledge, few errata have been filed describing the issues (ie, implementers have either not noticed or have not reported problems). I don't believe there is currently a consensus, even a rough one, that significant changes in these areas are necessary. > I might have included TLS vs Kerberos as providing over date in flight security. > > I would like us to focus on changes to the requirements to provide in flight security, which does not necessitate changes to the various protocols, versus new requirements which force us to change existing implemementations. A threat analysis, IMO, does not specify new protocol. The typical threat analysis enumerates threats and then describes security policies that implementations provide to address each category of threat. Thus a threat model can enumerate attacks that make AUTH_SYS insecure, and discuss the various generic conditions that mitigate those threats. "To make NFS on AUTH_SYS secure you need peer authentication along with confidentiality; here are some mechanisms that provide those services adequately" is fair, but "To make NFS on AUTH_SYS secure the client MUST use RPC-with-TLS" is over-specified. >> ---- >> >> This document describes the core features of the NFSv4 family of protocols, applying to all minor versions. The discuss includes use of security features provided by RPC on a per-connection basis. >> >> The current version of the document is intended, in large part, to resulting working group discussion regarding existing NFSv4 security issues and to provide a framework for addressing these issues and obtaining working group consensus regarding necessary changes. >> >> When the resulting document is eventually published as an RFC, it will supersede the description of security in existing minor version specification documents such as RFC 7530 and RFC 8881. >> >> ---- >> >> The chairs would like to establish if there is interest in adopting this document by the nfsv4 working group. The call will run for two weeks until the end of day on 10/26/2022 (UTC time). Please send any objections or expressions of support for adoption to the wg mailing list. I have a problem with having to adequately review hundreds of pages in these documents within two weeks while still attending to the priorities of my day job. In particular, the lack of tools like rfcdiff and "git log" to examine changes to these documents carefully make their review more time-consuming than usual. I think rfc5662bis is the only instance where rfcdiff currently provides a clear view of document changes, which makes WG adoption of that one a no-brainer. Due to the broad scope of nfsv4-security, rfcdiff by itself is not adequate. The base document for comparison needs to contain only the sections RFC 8881 that are changed or replaced, in the order in which nfsv4-security presents them. Such a base document needs to be provided in order to analyze the document's proposed changes and provide properly-specific change requests. The adoption calls should run serially for the split-up documents. Or, please extend the request windows for these adoptions into mid-November. I would like more time to adequately assess these adoption requests. >> As stated previously, since I am the editor of this document, I will not be involved in determining whether a consensus exists. That responsibility will fall to Brian with Zahed available to fill in if Brian is unable to perform that role. >> _______________________________________________ >> nfsv4 mailing list >> nfsv4@ietf.org >> https://www.ietf.org/mailman/listinfo/nfsv4 > > _______________________________________________ > nfsv4 mailing list > nfsv4@ietf.org > https://www.ietf.org/mailman/listinfo/nfsv4 -- Chuck Lever
- [nfsv4] Adoption call for draft-dnoveck-nfsv4-sec… David Noveck
- Re: [nfsv4] Adoption call for draft-dnoveck-nfsv4… Thomas Haynes
- Re: [nfsv4] Adoption call for draft-dnoveck-nfsv4… Chuck Lever III
- Re: [nfsv4] Adoption call for draft-dnoveck-nfsv4… David Noveck
- Re: [nfsv4] Adoption call for draft-dnoveck-nfsv4… Thomas Haynes
- Re: [nfsv4] Adoption call for draft-dnoveck-nfsv4… David Noveck
- Re: [nfsv4] Adoption call for draft-dnoveck-nfsv4… Rick Macklem
- [nfsv4] Fwd: Adoption call for draft-dnoveck-nfsv… Brian Pawlowski