[nfsv4] Re: back to AA
David Noveck <davenoveck@gmail.com> Sun, 08 September 2024 15:35 UTC
Return-Path: <davenoveck@gmail.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 22539C14F5ED for <nfsv4@ietfa.amsl.com>; Sun, 8 Sep 2024 08:35:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.104
X-Spam-Level:
X-Spam-Status: No, score=-2.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wlgL4wuPiD0y for <nfsv4@ietfa.amsl.com>; Sun, 8 Sep 2024 08:35:40 -0700 (PDT)
Received: from mail-qv1-xf30.google.com (mail-qv1-xf30.google.com [IPv6:2607:f8b0:4864:20::f30]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3970AC14E515 for <nfsv4@ietf.org>; Sun, 8 Sep 2024 08:35:40 -0700 (PDT)
Received: by mail-qv1-xf30.google.com with SMTP id 6a1803df08f44-6c35427935eso19458666d6.3 for <nfsv4@ietf.org>; Sun, 08 Sep 2024 08:35:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1725809739; x=1726414539; darn=ietf.org; h=cc:to:subject:message-id:date:from:references:in-reply-to :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=5ydspymKfEqIsTp8KgfYJ5BQTXnt2wgKPAUhqyrQMKg=; b=ZoukCcWY9nvYoc6fovvIeIBCO0zOHDw+ZZ9uwHM8mlkC7Gbcr6KEwltEbewsbDlBhy Dhvr9U9sUse11U9SAFBwEv6+XkR3OPvcfO8xGBfaDCu17nZp0FejdE2ER2gl76oTjTCo pfHktYcmuV4cDKxOZ3DnX+4IRb4C/QmDYRQ9vpNpiqZXCOfQ+DFhSDeZKBeXxL/8uqNX yB8xI89RV22oQL1ljtb3dDx/GLVlY+FgziRWOjtJhgwhgfyBZKpw9yW3zl5ZhOQZv0oG SDA/mRitsjfGsE5RKFK59gbLQdrTSoJOi7mjnhRQlQzk+ZgknLqz/YGaJNb+0d/9lP1Z 10TA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1725809739; x=1726414539; h=cc:to:subject:message-id:date:from:references:in-reply-to :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=5ydspymKfEqIsTp8KgfYJ5BQTXnt2wgKPAUhqyrQMKg=; b=KG2IoAoZMPMYNaato18sWfKl6DKDvTtpsmJFF6AK8SItQC+bTiy8OUDr3Gcz/24zEl pCNTiLIIobT9vdxHw8FWlD7/n4HVwNHf86rcGz4MHd/KzXwX3ZwYz2GYX3vuT9OkghUm Pl/vjshxJ5TeS3pfKTqOQvQiT9wnrnEA5z1LKSTeP4CAJ14XuUI+hJIiLOx1NHfNzfqQ 4T4nKMvV6UOUM8MyVRmR6xEHEGe3ehP1mKrzV0pcia4YNd+q9oZQq9K68jhPqTxMvS4p FVvVfM5DT8GvBmUpJMPm42UE/RGB9lxL2c4L6wevP29WMr8Nt5CmaPPBHyEUZorIKKDJ MLbw==
X-Forwarded-Encrypted: i=1; AJvYcCX6kgIQpuKdDcTYx9vviX3ZD5bZx+7NzFVYtqom8/wGG7R+KxEMQtG9jsc0WHGV6Q7sJtbehA==@ietf.org
X-Gm-Message-State: AOJu0YxeoUxAgv6RyuPEwsl9+Um1lBjt58jZaufuFoY9kGlpnoX5w17+ vgY24Bvl2xAAeJJEp6YSuhzd4jzzrablKI7i7q0nH5yeSf4Lo748jhL05Lo/UUabElIZ0XyQCSB 2AACotsX5ay4B7tluZrhRn/v9ZBE=
X-Google-Smtp-Source: AGHT+IFx8AcMhaoZxfnoPPDWK+7nbnprmKY5inQosGGw0cnRFRUzosAFXV+ZuTNjEEc77RoNOs9Jv3DgF4URCOg0j/I=
X-Received: by 2002:a05:6214:31a0:b0:6bf:6f7e:39c1 with SMTP id 6a1803df08f44-6c528510838mr134981726d6.47.1725809738850; Sun, 08 Sep 2024 08:35:38 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a05:6214:2267:b0:6c3:7010:1c1d with HTTP; Sun, 8 Sep 2024 08:35:38 -0700 (PDT)
In-Reply-To: <8510AEBC-237C-4E2C-AE27-909A8FE50CA7@cert.org>
References: <F2FA0129-5780-4257-8E18-E04865D6BCC4@cert.org> <CAM5tNy7fhU5s+EufRS3aq2zYSdjrtD_ijj1RgHcTv0WzGcbT0Q@mail.gmail.com> <8510AEBC-237C-4E2C-AE27-909A8FE50CA7@cert.org>
From: David Noveck <davenoveck@gmail.com>
Date: Sun, 08 Sep 2024 11:35:38 -0400
Message-ID: <CADaq8jcKnEtM3jqKk=78RxPahyu-s0MZABxufUJu1AnkRt+7iA@mail.gmail.com>
To: Chris Inacio <inacio@cert.org>
Content-Type: multipart/alternative; boundary="0000000000006f2a8206219d64f3"
Message-ID-Hash: MBP7NLPTJSWM7DQW22CS7KM6VX74LMAD
X-Message-ID-Hash: MBP7NLPTJSWM7DQW22CS7KM6VX74LMAD
X-MailFrom: davenoveck@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-nfsv4.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: NFSv4 <nfsv4@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [nfsv4] Re: back to AA
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/vDkpoZbXjMSbacdnYqO4gyS6CWo>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Owner: <mailto:nfsv4-owner@ietf.org>
List-Post: <mailto:nfsv4@ietf.org>
List-Subscribe: <mailto:nfsv4-join@ietf.org>
List-Unsubscribe: <mailto:nfsv4-leave@ietf.org>
On Friday, September 6, 2024, Chris Inacio <inacio@cert.org> wrote: > >> > >> I would like to add an Authentication/Authorization topic. To scope > down what I would like to discuss here: I need to read RFC2203 first. Just > from browsing the table of contents for 2203, I’m not sure this helps me > understand what are *the protocol needs* with how a file system backend > stores/maps the network identity of the client. > > I don't know if this will help save you some time, but here is my > > recollection of how RPCSEC_GSS/Kerberized NFS works... > > - The client translates a user identity into a Kerberos principal (a > > string like "rmacklem@MY.REALME"). > > (This is usually a trivial mapping of username and default REALM.) > > --> The client uses the user's TGT to acquire a session ticket from the > KDC. > > - The GSSAPI layer wraps this session ticket up in a blob they call a > token. > > - This "token" is sent to the server via a Null RPC by RPCSEC_GSS layer. > > --> There is a back and forth between client and server, using Null RPCs > > in the RPCSEC_GSS layer that, if successful, authenticates the > Kerberos > > prinicipal name on the server and creates a shorthand for the > > Kerberos principal. > > (Translation from Kerberos principal is whatever the server > > chooses to do. > > For POSIX like systems, it typically strips off the @REALM > > and then looks the > > name up in the password/group databases to create POSIX > > credentials for the user, > > which are associated with the shorthand mentioned above.) > > --> Then the client uses the shorthand (authenticated via encryption > > using the session key > > from the Kerberos session ticket) to identify the "user" to the > > server. That's what RPCSEC_GSS > > is doing for non-NULL RPCs. > > (Hopefully this is close. It has been a long time since I coded this > stuff.) > > > > This is really helpful, thanks. (Is this in nfsuserd in FreeBSD? Pulling > up the code - you apparently wrote it in 2009. ;). I’m happy because it’s > basically a single file of 909 lines.) > > Ganesha must do this differently, right? Doesn’t it run in user space? > Does it have a separate DB for this mapping? The example I can find is > Ganesha running on top of Ceph – and it doesn’t seem to be particularly > running in user space. (https://github.com/nfs-ganesh > a/nfs-ganesha/wiki/Kerberos-setup-for-NFS-Ganesha-in-Ceph). I am making a > lot of guesses on Ganesha operation I’ve realized. > > > In theory, other mechanisms than Kerberos can be created for > GSSAPI/RPCSEC_GSS, > > but there has not been much done. (Long ago there was an RFC and some > code for > > a public key system, but no one adopted it.) > > > > It sounds like Tigran et al might be thinking of a new mechanism, > > although I haven't looked > > at what he has written up yet, > > > > Right now there is more the statement of what might go in such a draft > than the text itself. I would really like to understand how someone who > manages a hybrid multi cloud instance for data storage deals with AA. It > must be complicated. The SCIM WG (https://datatracker.ietf.org/wg/scim/) > is developing cross-domain identity management. I have no idea if it would > help at all, but if that’s a the right tool for a problem we (eventually) > face it’s available. (Although from what little I know of it, I would > rather use ONC RPC than RPCs built on top of HTTP, but maybe I’m just old.) Your age doesn't matter. Neither does mine. What does matter is that NFSv4 is defined to use ONC RPC and it would be a massive undertaking to try switch that. We would need a major justification to justify this enormous amount of work including a way to replace the functionality of rpc over rdma in an http framwork. > > >> Please *do not* think I’m trying to standardize how that works (that is > a server implementation choice) but what needs to be on the wire to enable > servers do that _however they chose to do it._ > > Reading through enough of the POSIX ACLs some of the large > > differences between NFSv3 and NFSv4 become clear. > > I'm not sure if this sounds silly, but on-the-wire it is basically a > > string (owner/owner_group defines it as "user@domain", > > where the domain was never well defined. (Right now, most just handle > > one "domain". I don't think there is even a well > > defined way of checking "same string". By this I mean, does the DNS > > case insensitive and/or puny encoded rules apply?) > > > > Good points to consider if there is an extension to think about how to > update AA. I'm assuming you are not proposing updating anti-aircraft. Seriously, updating authentication is a big job and I don't see any need to update authorization beyond the world Rick has proposed for draft POSIX ACLs. Trying to update.both of these together would be a big mistake. > > > (For authentication, it is still a string, but with something that > assures the > > server that it is legit. > > > > rick > > _______________________________________________ > nfsv4 mailing list -- nfsv4@ietf.org > To unsubscribe send an email to nfsv4-leave@ietf.org >
- [nfsv4] Interim meeting agenda topics Chris Inacio
- [nfsv4] Re: Interim meeting agenda topics Rick Macklem
- [nfsv4] Re: back to AA Chris Inacio
- [nfsv4] Re: back to AA Rick Macklem
- [nfsv4] Re: back to AA David Noveck
- [nfsv4] Re: back to AA David Noveck
- [nfsv4] Interim meeting agenda topics David Noveck
- [nfsv4] Re: Interim meeting agenda topics Pali Rohár
- [nfsv4] Re: Interim meeting agenda topics Rick Macklem
- [nfsv4] Re: Interim meeting agenda topics David Noveck
- [nfsv4] Re: Interim meeting agenda topics Pali Rohár
- [nfsv4] Re: Interim meeting agenda topics David Noveck
- [nfsv4] Re: Interim meeting agenda topics David Noveck
- [nfsv4] Re: Interim meeting agenda topics Pali Rohár
- [nfsv4] Re: Interim meeting agenda topics Rick Macklem
- [nfsv4] Re: Interim meeting agenda topics Pali Rohár