[nfsv4] Re: Feedback on user ID for any bis work

Chuck Lever III <chuck.lever@oracle.com> Fri, 16 August 2024 16:26 UTC

Return-Path: <chuck.lever@oracle.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B286BC14F71C for <nfsv4@ietfa.amsl.com>; Fri, 16 Aug 2024 09:26:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.805
X-Spam-Level:
X-Spam-Status: No, score=-2.805 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=oracle.com header.b="jctGHbGS"; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.b="A+wpSivK"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vmG4xW5sGZ2l for <nfsv4@ietfa.amsl.com>; Fri, 16 Aug 2024 09:26:15 -0700 (PDT)
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com [205.220.177.32]) by ietfa.amsl.com (Postfix) with ESMTP id 02670C14F6B0 for <nfsv4@ietf.org>; Fri, 16 Aug 2024 09:26:14 -0700 (PDT)
Received: from pps.filterd (m0246630.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 47GFiXjo026386; Fri, 16 Aug 2024 16:26:13 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h= from:to:cc:subject:date:message-id:references:in-reply-to :content-type:content-id:content-transfer-encoding:mime-version; s=corp-2023-11-20; bh=UlunLGFRJNVWNJYgpRU29EU3SdB8RlhOhnk/eB5OU sg=; b=jctGHbGSuzKZ68gEOfq8Br1ht58Q4pOssJ6XUWDXpozhlAaUJLC55XL5Q 6Ag4mAbelSUB5hzVVwRoNyLU4SWywo7PKNlsdsr9mLsPBSYxeMmNvpnXkz+DmIxO Az1wBwywZ+BCDHpbawdg4nDIVI0oOwxyo+FoUcQI3Az/1lgUrzfVppP5O5jAtvYo /cuNGzh9JT67LfHa85RDRd6Qqh6RAJMu2dAOpz0CHDsQxKl7dwmmM0rdGtLywvmw 5mZXodCIgHu1WIOuLC++7Mup3b68R6Gz/9R7SKmdN+F+p6aPaAkIgpyk4aiOpdgt 1r4E/L1mnyZwEk3E/rKdaMDTVQOHw==
Received: from iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta02.appoci.oracle.com [147.154.18.20]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 40wxmd4sk8-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 16 Aug 2024 16:26:12 +0000 (GMT)
Received: from pps.filterd (iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com (8.17.1.19/8.17.1.19) with ESMTP id 47GFl2Md020853; Fri, 16 Aug 2024 16:26:12 GMT
Received: from nam11-dm6-obe.outbound.protection.outlook.com (mail-dm6nam11lp2169.outbound.protection.outlook.com [104.47.57.169]) by iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 40wxnk3pve-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 16 Aug 2024 16:26:12 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=godwtLCPGY3xI7wI4Qv5DPBPVx9rgOo9c/izrb79ZksiiQzTUX4Yf+3TdimNynBR2ZZ9yu5zYjcr+MtI2Alm88RCG8JMFNmMtn4hUfnZB96cfczNQq9OI3Epwp9eunNI8jooxZb/JWOSjfF+SmXT+xefNWi5I/qlSRDtcJpFTEOZnZVRnEre1RAMeeKhF3hBmtbW+f5p8B3YOsonqZEPiQcF9pFF8RgbLPRWdFRMXZLywIdaG0UHvfkYecOwrdao2bdb+e3riwPqwvfHaZn/XXJhbGWzHbd+lMAYWTizbGAnGMn91llLdWFmlvpI+aiGLws4eubeUWpFnxcsbBu91w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=UlunLGFRJNVWNJYgpRU29EU3SdB8RlhOhnk/eB5OUsg=; b=I1e6PgYpXVeQH70azA003n1xItmn2wpxAidcTEc/VFDGjenYopydU4IFjvJiEArUSaNjHMBm9+uPm+KTlYrqrDNKQd+ZiCwChQ6GNCmWvz28RUSEv7g/ivo3XYb38915Am0n22ruL68IbnqEW3yxs17/oIV42+Ar/7lF/iPKx1r9OWir1gXs/eA3JEc3PEhY1JPuCik9p0RyjhjJk0yjjDusrwyOgzh7zu9j/JVeoHcmoJKylI6SJyIeaI9TxR+2HzoQTVoupRpti8oM7ye10/WHpqE/zmHS5C67BU9pqBZZ10Fo0V7jrYPnh6/b8tzXdW1TlvS/GxGnANZZdP0HcQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UlunLGFRJNVWNJYgpRU29EU3SdB8RlhOhnk/eB5OUsg=; b=A+wpSivKAxBr49GkcVoeC/cMWlXJLyXozU1HjntekOd6i8EE9qgQTGQs8gm5qqChc/bdFtHDsL2DkGBzCiGBySW/m2UScOhXSzdhlsVivsiZ+Kcx7CCBjbHKET8jccS+Euh5PeKYwMYgcKKCptVfQ5D9cW04bvMt+mdec82DS9g=
Received: from BN0PR10MB5128.namprd10.prod.outlook.com (2603:10b6:408:117::24) by CH3PR10MB7187.namprd10.prod.outlook.com (2603:10b6:610:120::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7897.10; Fri, 16 Aug 2024 16:26:09 +0000
Received: from BN0PR10MB5128.namprd10.prod.outlook.com ([fe80::743a:3154:40da:cf90]) by BN0PR10MB5128.namprd10.prod.outlook.com ([fe80::743a:3154:40da:cf90%6]) with mapi id 15.20.7897.009; Fri, 16 Aug 2024 16:26:09 +0000
From: Chuck Lever III <chuck.lever@oracle.com>
To: Chris Inacio <inacio@cert.org>
Thread-Topic: [nfsv4] Feedback on user ID for any bis work
Thread-Index: AQHa7/KE9d6p/SW7M02Rse1C0+ZRwLIqEg+A
Date: Fri, 16 Aug 2024 16:26:09 +0000
Message-ID: <DCD380BF-74D5-4FED-94EA-EC995A9DB164@oracle.com>
References: <88CFBD80-2BAA-43AE-8AA5-C032C2761266@cert.org>
In-Reply-To: <88CFBD80-2BAA-43AE-8AA5-C032C2761266@cert.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3776.700.51)
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN0PR10MB5128:EE_|CH3PR10MB7187:EE_
x-ms-office365-filtering-correlation-id: 2ce0931f-5173-48fe-60ab-08dcbe10231e
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|366016|1800799024|376014|38070700018;
x-microsoft-antispam-message-info: 1IEUvOo0h2GZ0NoahTNACRzrWIxCnNj4XWKA9G+yUcoirCnRIRxgUL5c34rVAcZ2r800SlwN62+o/wTQQILYCOUx9oCdhe8jFpRKcQo+sU/NbVuEwJOQ3XUQA0mrwhjBPSkSBmRwAIbLF/5/7rcVNYZIUm4laCJhsbr+OMGp4BlRy+Yt4ED45ELq/f14zNXPRtttYIGU1zflvzdMzGXfLNuNmU4c3FR4VpM45eoaL+yFSb3MmSjCOgbuyc/LO7ilTropmJfuKjswZsAU13m6oWAWtSe0nES4/XMdMSY+wetpyz24DMNaoXR/FLM+eYU/5eU+by/WkDRtp4QVlNDFeLcGaeEGuFKLc3p7lMhQ0DNqOxNa1qaKZSyYqNxo0N1+aF7eeJniH5Fnlf2kPTcjce678v3Y3tAhtQMRqlBBnwpno6gNLlaHNhDmjb9erYi8wc3pkfyPbOuqC6T6ZkKZnPPCng5yVOM2gz6mtpp+vAJ7jzdAeitZ3jTa/Ffb8chK3a93Ary1mqII1YDgTWScvm/5tk2+Jw9kAkmQPUK1aPoqKVJBRXL/erHppoxh35GnQ2yPFJ7Swj83R0Zy0NLwZ0pDBMJddzLGj76JqfVLCGXmYqR1xui+jla/NuRATfdK3nVlOsvC3Ow8S08hfx0Y6wBmrSkA7mtds3gwcyragFol2YB06yeAsWcKnE+DkFM6Qy9wn2H10TKAkYRbPBouWuLWDbJK3/Fiv/5ZTy1vortOJWeHbKGDYUkKrJlyYTrwI4lL68n2DpGsISA5KXw8UMYH/vwuE9PFaaRyCok9rEM3stZmrUZFMum+J87BuzyDQ14opHEkflu/wvlQPkEiHLiJuaxkosx+gm18NXA1QwqEOlTLl4BjLQqel6gpi7RaCewGV4mtTXvk35sZ0ogPfKyuYSS7AIf3aYeLEbnpdGeEF23CeIGvGDHJ/9cjnrvb4/fqMmiu1Il/PKX5eE8zgyaM40QmMAe9yh7n3ZaFtbdPCua5/XvET0qYSyrEWTp40WdF2tsGIKqk3Yn0ZWgGG9jEA81OJPzMVRJuIBRYFD35hcRTFi4H5WPudpJ2E7m8OkmxhhEo852NbX8nJ5vymPOZUjLAYNQFARlRPiHpsL/BelVRcYIBcCXdOhjH75OHSeJMIgYHveDDa8g/L8Edf2bpotkvEPXdHm1mV7N4XrL2fK+w1m3bQJnxbR9NYET3ufc/ZQ2mlzTq65a5B94aL+hfi4DR8koGQGUwVfqgw/lW9buvIrgqPTPZw/9dSpRGJDYqRFLYGBKTmNTUDMPum6sdmxEN5IocvtfeofOdbOUM8pL5uB8+4eREiHYZ8RCmm6E9AalvWqRYXfnEOaDz2NhQJ2KvmnvRJ7KWDiT2KGRBueHVxOM9O94Pj581TggoVWLQIQov2Nr9jNa8sEgeGw==
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BN0PR10MB5128.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(1800799024)(376014)(38070700018);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <B4F979E793DC38448707474C1A3215AC@namprd10.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN0PR10MB5128.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2ce0931f-5173-48fe-60ab-08dcbe10231e
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Aug 2024 16:26:09.7101 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: aYR9K2dFqofk/+Jqd3OCygE1vbVRZKsBz6w8HFpHBrUyM/StVyfsiN5WCkOqa7F0vXdta1doXG7DSDkoktFF6g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH3PR10MB7187
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1039,Hydra:6.0.680,FMLib:17.12.28.16 definitions=2024-08-16_11,2024-08-16_01,2024-05-17_01
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 adultscore=0 mlxscore=0 bulkscore=0 phishscore=0 malwarescore=0 suspectscore=0 spamscore=0 mlxlogscore=996 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2407110000 definitions=main-2408160116
X-Proofpoint-ORIG-GUID: NRYBusFrE8_I9ZZpdQAJbBEk_27igJw9
X-Proofpoint-GUID: NRYBusFrE8_I9ZZpdQAJbBEk_27igJw9
Message-ID-Hash: A66JSX77MUIAX2DYODHQYZLRFYVQ2B4U
X-Message-ID-Hash: A66JSX77MUIAX2DYODHQYZLRFYVQ2B4U
X-MailFrom: chuck.lever@oracle.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-nfsv4.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: NFSv4 <nfsv4@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [nfsv4] Re: Feedback on user ID for any bis work
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/psN1dbrjUfwcIiK6s8a9WbUv79c>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Owner: <mailto:nfsv4-owner@ietf.org>
List-Post: <mailto:nfsv4@ietf.org>
List-Subscribe: <mailto:nfsv4-join@ietf.org>
List-Unsubscribe: <mailto:nfsv4-leave@ietf.org>


> On Aug 16, 2024, at 11:39 AM, Chris Inacio <inacio@cert.org> wrote:
> 
> Dave, All,
> 
> INDIVIDUAL CONTRIBUTOR HAT ON - NOT CHAIR
> 
> We need this super brief conversation in one of the interim meetings about how user identity is communicated across NFSv4, and there are 2 options, UID/GID ‘integer's and then loosely defined ‘string’.  So I’ve been digging into this and I would say, most definitely, do NOT remove the string.  So what I can see so far, is that UID/GID numbers are used when auth ‘sys’ is the selected mechanism, where current the string is used when auth is tied to GSS-API.  As far as I can tell, the kerberos principal name should be the string in the field.  I certainly don’t yet have a full understanding about how everything is connected together.  (Just sending the principal is nice and everything, but you want to be able to verify it, and HOLY RAT HOLE ROBIN is that confusing in practice.)
> 
> So, the thing I’m trying to make sense of, how hard would it be to support TLS identities (X.509 certs really) instead of Kerberos.

A perhaps subtle distinction here:

The current RPC-with-TLS protocol uses x.509 explicitly only for authenticating
network peers (ie, hosts). RFC 9289 even says "not for user authentication". So
I think the term "TLS" here is probably misplaced.

You instead want to invent a new RPC security flavor or flavors that authenticates
users (or, dare I say it, to extend GSSAPI to handle this for us) via an x.509
certificate, or OAuth, or such like. Nothing to do with transport layer security,
which doesn't know from users.


> That also opens a fairly different control domain.  Kerberos is well suited to local enterprise control.  You can do that with X.509, but really, my anecdotal experience says, X.509 certs for enterprise are too heavy a lift, but they’re the answer when you want a more global identity.  That raises the question of target users of NFS protocol.  And if we’re (or maybe that’s just me doing it?) opening a wound there – then maybe we want to be able to support authentication and authorization that is more cloud compatible, which is potentially more than X.509.
> 
> These are just thoughts and feedback on some discussions.
> 
> Chris
> 
> 
> P.S.
> 
> The complexity of auth is BONKERS!!!  So to kind of dig into this I have a freenas server running with ZFS as the backing store.  It’s the FreeBSD variant 13.0 stream.  I then deployed an LDAP and Kerberos solution (freeipa on Fedora) to have that running on an RPi4.  (This is all in my house, by the way.) For clients, I have a _real_ menagerie of machines: Mac OS 14.6, RPi Raspbian, FreeBSD, and Win 11.  For fun, that means NFS versions running are:  Mac OS 14.0 - NFSv4.0, Raspbian/Linux NFSv4.2, FreeBSD 13.x - NFSv4.1, Win 11 - NFSv3.  I can get most of the unixen to at least get a Kerberos user principal TGT.  Machine-to-machine, host principals are still a bit of a challenge.  The Windows machine seemingly would rather piss in my Cheerios than do what I want.  (What engineer where convinced their UI people to be able to give error messages as ‘1450 resource unavailable’ and then you need to type `net helpmsg 1450` to get an actual error message, which is completely useless anyway?  That person is either my hero or the devil.) And while Windows doesn’t want to cooperate at all, the unixen management of authentication identities is its own entire disjoint universe!  ‘SSSD' on Linux, ‘nfsuserd' on FreeBSD, and I haven’t even tried to cross that bridge on Mac.  So I’m still trying to get this collection of stuff to attempt to do full kerberos/gss-api negotiation on a mount.
> 
> 
> Maybe this is why people run with auth sys!

No "maybe" about it, this /is/ why people stick with auth_sys.


--
Chuck Lever