Re: [nfsv4] Comments on draft-ietf-nfsv4-integrity-measurement-07

David Noveck <davenoveck@gmail.com> Tue, 12 November 2019 14:09 UTC

Return-Path: <davenoveck@gmail.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 24E9C12004C for <nfsv4@ietfa.amsl.com>; Tue, 12 Nov 2019 06:09:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nSPS02gR0qfi for <nfsv4@ietfa.amsl.com>; Tue, 12 Nov 2019 06:09:45 -0800 (PST)
Received: from mail-ot1-x331.google.com (mail-ot1-x331.google.com [IPv6:2607:f8b0:4864:20::331]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 519E8120033 for <nfsv4@ietf.org>; Tue, 12 Nov 2019 06:09:45 -0800 (PST)
Received: by mail-ot1-x331.google.com with SMTP id r24so14350060otk.12 for <nfsv4@ietf.org>; Tue, 12 Nov 2019 06:09:45 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=mkFrwkNTgy4p5yrQ3nxVvVOBKiWbaCqDTh9aeaqdv2Q=; b=VDUGeTZQyqfb23QJkP+qxrSgzp1mT9U0D+bH9NLzkvTOj7sEMOchnM8vm/U/iUgyLM rgTct9VStLHSnO4yc0/xiWmS8KqYcs+kP41qUnW4v5LWfaXccVbfEgodtyWKKTubOb/a uPd9dzr6cSZSajElACyUuVzHPCB+q9LFC9jeOuW8qcfmRVukcZOWeteTSDK6DFAXRmav NjpdbQqAJ2y+42N4A4oBjql9HRHWhbCKFIRPeJW+i1yEbpD9cA4P1M6wE2VLxDLVXhk8 TyDgMpf9WOiU/+Y0WX3KrmxuZpuEOPCfgplUNbj22ZCZgr6/RK1zwUJWKLwNVnNv1bqW qUMA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=mkFrwkNTgy4p5yrQ3nxVvVOBKiWbaCqDTh9aeaqdv2Q=; b=os5BpcVYXBDHs4L46YBsD4AfnQXefa60TmeRAdDoISmRqhsDoIcMfkn9NDzsL9Oob8 DLNj5kH3BAc9tUyWPLoUnZNH2p/Z696s8C6OP+ppZ56r3AhicFY5nipTCjFD4aivrCUo Kp0DFDWQdWijlccKizGSr35DMpC6RjlJSOHW7FKZ36SOLSgll+ToEnCY4p7SmK+EF+mH Lw2Qn5PxzIvBClTnO8qqNndOtMLZbdLngKBWRBJFp5NVe0m9auiGxBEaAmKRqUOxFIm8 EzjnZwV4CewMP4IzkCClpr4ZbETkyGJGooyb3hLuU2vE0HHz7OTclA+MfYe49s9vuMNq esYQ==
X-Gm-Message-State: APjAAAWk4BFCyNJoVBF461crPDH0MTUiDcIO1aQYqbhUDfOn+iqLx1yQ S61rtITB0vm5YD2/9/GxpIFIDC5cm9UP9W+xKFY=
X-Google-Smtp-Source: APXvYqzSKSDBliwlqDYSOw47ScwYNHtVHfcRBSydF6atTCePGjuk76IvM3Cn4gV2UY97nJxwivY9jfOeU2nva4ZEm3c=
X-Received: by 2002:a9d:154:: with SMTP id 78mr15550964otu.294.1573567784333; Tue, 12 Nov 2019 06:09:44 -0800 (PST)
MIME-Version: 1.0
References: <CAFt6BakApq=FJWs+r-jwxvTdXYs9yOg9KS47no93kdnp2gZ_+Q@mail.gmail.com> <9BEBDE7A-522A-4A6B-8132-D9C3A8A4922C@oracle.com> <CAFt6Ba=q=vSt+wtcHsi59gWnwFpuUaDqQue7f=GFSUvd25uV+g@mail.gmail.com> <BFDF314F-B913-4C4A-BAB4-C09FA840F4F6@oracle.com> <CADaq8jc_gM0SWe9weRJYp7s7xjtN9kihbVnUiBN61hF2LUJjzQ@mail.gmail.com> <FD12C92F-BBF4-4174-B896-48738C02B78E@oracle.com> <CAFt6BanwC4uu=9SpZQdiGjFswzkC3cSWPzGia34qBT5W+uuMNw@mail.gmail.com> <5B51BB44-F39D-4EF6-9E1E-3EF958F90260@oracle.com> <20191031192409.GJ88302@kduck.mit.edu> <67D69A00-D231-4845-A840-F3D67D629554@oracle.com> <CAFt6BanShDjwD3SftuDUvChFq9zOU5h1UC2y=W+3bVm++jAEKA@mail.gmail.com> <479C7409-9DCF-4C11-84AB-2E3729D96B22@oracle.com> <CADaq8jfMXjewirgvyCgh3D+yXQSNEX3HbWMCnz=XYCKk5T=6iA@mail.gmail.com> <00F112E6-F869-4624-A68E-9C909AB3B653@oracle.com> <CADaq8jckJQ2GZw-wEY-TLhqWhXcom1QNn8oTLL6TSNZy+4OHzg@mail.gmail.com> <9EAD488D-D246-4961-A6F7-4926734AF292@oracle.com>
In-Reply-To: <9EAD488D-D246-4961-A6F7-4926734AF292@oracle.com>
From: David Noveck <davenoveck@gmail.com>
Date: Tue, 12 Nov 2019 09:09:33 -0500
Message-ID: <CADaq8jfz-H=0n_UaMNFQ1KGWOYA2M-sg+spddHsMPDdFbXRA6Q@mail.gmail.com>
To: Chuck Lever <chuck.lever@oracle.com>
Cc: spencer shepler <spencer.shepler@gmail.com>, Spencer Shepler <sshepler@microsoft.com>, NFSv4 <nfsv4@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000d0b5f2059726cc87"
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/tRnP-6LjIGIHtciHfwmz2W4D_24>
Subject: Re: [nfsv4] Comments on draft-ietf-nfsv4-integrity-measurement-07
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Nov 2019 14:09:48 -0000

> There is also the question of whether the format discriminator field
> not only marks the internal format,

I don't understand.   I would think that the format discriminator
identified the *external *format.  Of course, as a practical, matter,
a server implementation might well choode to make the internal
and external formats the same, since it doesn't really care.

> but also allows the storage and
> retrieval of metadata stored in other xattrs (unlike the discriminator
> for NFSv4 security labels, which applies only to one xattr).

>From the NFSv4 poiint of view, the particular (system) xattr used
for this purpose don't really matter.   Since they are not not
NFSv4 (user) xattrs, any such assigment is purely an
implemenation matter.

> IMA, for example, already uses two xattrs, security.ima and
> security.evm, that can co-exist on the same file.

That the first of hear of this and your spec does not mention it.
I presume this is because this division into multiple sub-blobs
is not necessary to implement the protocol you describe,
although it might be necessary to implement appraisal.

> It would be slick
> to add support for security.evm simply by adding another entry into
> the IANA registry.

I don't see why this wouldn't work or why it is even in question.
If there is a furure IMA metadata format consisting of these two
sub-blobs, it would not affect the protocol yout have described.
Servers would not care about this sub-dvision while those concerned
with appraisal would have to be aware of them.  However, they would
not need to know anything about how these sub-blobs were stored.
I assume on-Disk Linux file systems would use these xattrs, while
NFSv4.2 servers with no appraisal capabilities would probably store
the whole blob  as-is.

On Mon, Nov 11, 2019 at 4:57 PM Chuck Lever <chuck.lever@oracle.com> wrote:

>
>
> > On Nov 11, 2019, at 2:43 PM, David Noveck <davenoveck@gmail.com> wrote:
> >
> >
> >
> > On Fri, Nov 8, 2019, 10:12 AM Chuck Lever <chuck.lever@oracle.com>
> wrote:
> >
> >
> >> > On Nov 7, 2019, at 6:13 PM, David Noveck <davenoveck@gmail.com>
> wrote:
> >> >
> >>
> >> It appears that draft-ietf-nfsv4-integrity-measurement can't move
> >> forward without some description of the IMA metadata format.
> >
> > It is my understanding that you already plan to do that in -08.
>
> That is what I proposed last week. Now I'm thinking the description
> could be a separate document. Certainly a description could be
> published separately by the IETF (eg., nfsv4, rats or teep) or it
> could come from some other SSO (such as TCG).
>
>
> >> My preference would be that the Linux community is responsible for
> >> the process and document(s) that describe their own format.
> >
> > That's very sensible but that doesn't mean it's going to happen.
>
> As a card-carrying member of the Linux community, I can attempt to
> get it done myself. Two issues:
>
>  - Who will be responsible for maintaining the publication as new
> Linux IMA formats are introduced. IMA is currently an active effort,
> and I anticipate some integration with fs-verity will require a new
> IMA metadata format.
>
> - How long will it take to ensure the format is not encumbered by
> patent or software license. I have contacts at the Linux Foundation
> that I hope can help address this issue. I will also discuss this
> with any copyright holders.
>
>
> >> Failing
> >> that, a description can be added to integrity-measurement, as I
> >> recently proposed.
> >
> > Understood.
> >
> >
> >> To make an IANA registry a sensible thing to do, at least one more
> >> independent integrity metadata format will have to be identified.
> >
> > I think one has already been identified.  To make this scheme work,
> there will need to have a common metadata format implemented.
> >
> > Once it is implemented, it will need to be specified, leaving you with
> following tasks:
> >       • Identifying a victim to provide it.
> >       • Figuring out when/where it will be provided.
> > The virtue of the IANA registry is that it gives you the ability to
> defer these tasks.
>
> Deferral would be nice, as that would enable integrity-measurement
> to move forward sooner (assuming Spencer's objection is lifted).
> But it might be unnecessary if I can get a document put together
> and signed-off by others in the Linux community in the next few
> months.
>
> We did try an IANA registry before, and I'm willing to consider
> that again to help move this along. The e-mail conversation a few
> months ago rat-holed on whether or not there would be an actual
> need for multiple metadata formats, as I recall. We can put aside
> the question of over-engineering and decide simply that the document
> will start with a registry containing one format discriminator.
>
> There is also the question of whether the format discriminator field
> not only marks the internal format, but also allows the storage and
> retrieval of metadata stored in other xattrs (unlike the discriminator
> for NFSv4 security labels, which applies only to one xattr).
>
> IMA, for example, already uses two xattrs, security.ima and
> security.evm, that can co-exist on the same file. It would be slick
> to add support for security.evm simply by adding another entry into
> the IANA registry.
>
> Before I go too much further, however, I would like to hear from
> Spencer if he believes these changes would adequately address his
> concerns.
>
>
> --
> Chuck Lever
>
>
>
>