Re: [nfsv4] NFS over TLS for laptops

Craig Everhart <cfeverhart@gmail.com> Thu, 31 December 2020 17:37 UTC

Return-Path: <cfeverhart@gmail.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 70B9B3A0DFC for <nfsv4@ietfa.amsl.com>; Thu, 31 Dec 2020 09:37:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vt1O3VwV9qxp for <nfsv4@ietfa.amsl.com>; Thu, 31 Dec 2020 09:37:45 -0800 (PST)
Received: from mail-qk1-x730.google.com (mail-qk1-x730.google.com [IPv6:2607:f8b0:4864:20::730]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 904E93A0DF9 for <nfsv4@ietf.org>; Thu, 31 Dec 2020 09:37:45 -0800 (PST)
Received: by mail-qk1-x730.google.com with SMTP id f26so16872999qka.0 for <nfsv4@ietf.org>; Thu, 31 Dec 2020 09:37:45 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=content-transfer-encoding:from:mime-version:subject:date:message-id :references:cc:in-reply-to:to; bh=6hxOVyaphFbE50O0MjJ2XrpN5P0gTZT2qnnWxGT7sE8=; b=vMGADjuwgmz8eyrJB6K7rmNa8ibFThQy57hPrXkE0mdH/Dqg+8o2AtKRP9JMiFb+2x +MDZlMp7iwkBji3OSp4sgqi56y4E2jL55QQVcUsoICGLQCtHvnZtdy1z8ZuVraWSpfs+ iwHShPb/vXZdoInoFat0k95oWyLLeL4mR6AbjXFMp+EmCKS1pJbmXCIspJfCxCoyahNO lpgF4a9ovyYDeKDv1jsSGZAAFGQgI9XXht8nao2RCxcXLwFGh3JYBJvxq5CZn8No3g1t QvHsQ7cpeImyxymyiQ25bdhqngBs3NMu5n1E2aPbt8Z+qvb/FNaTjbZgsZkJ8Z2r1YOs DN1Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:content-transfer-encoding:from:mime-version :subject:date:message-id:references:cc:in-reply-to:to; bh=6hxOVyaphFbE50O0MjJ2XrpN5P0gTZT2qnnWxGT7sE8=; b=GGXuCx9oZmXd81TwmstmC8dbJgoicyYr/RsqiRPEjALfMh2w1zvYmDaRtsWIUp3WwG WCN1McFAcK1OAYeZaXQDPedCyz3fDiSjRueDS8e2o+C5nK9JMrvinnI9g1SzNgmfG5pG yddhOpFPOiOPT8p5S8UGPeqxC2eBksTJ0Xi4c5uXS2/n3t+eaLNMrq5llRxVOy5DNWsC 1IdMzAmD8T1B2pvbmv92DfEdHJv0FQvSExWl4WB72boYn3yoipHrwqriL7jt0xxV1g5i zc8d/tUPkBMGMQEoegWbE1izIEAobo5exlvZxCCJpb/G5dtlrCJLXG5fCOppAzqNPflf g5nw==
X-Gm-Message-State: AOAM531N5Re/WNVC1/Fhc+EENxfIL8DftxDJaxxThvJi/c2R03eDSyig isVYkR0NCvG0grYnGxh6E6M=
X-Google-Smtp-Source: ABdhPJwRj83tjh4O+/uejb46rp7VrlizqaSUiuGs2VmVmXKLvE4rzq9BCZx7Jt2PtSgfCXunZl8O0w==
X-Received: by 2002:a05:620a:2148:: with SMTP id m8mr56069744qkm.213.1609436264207; Thu, 31 Dec 2020 09:37:44 -0800 (PST)
Received: from [192.168.1.201] (pool-74-109-196-138.pitbpa.fios.verizon.net. [74.109.196.138]) by smtp.gmail.com with ESMTPSA id u7sm30629701qke.116.2020.12.31.09.37.43 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 31 Dec 2020 09:37:43 -0800 (PST)
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: Craig Everhart <cfeverhart@gmail.com>
Mime-Version: 1.0 (1.0)
Date: Thu, 31 Dec 2020 12:37:42 -0500
Message-Id: <688147CD-DE27-4657-9678-EB0399D9A16D@gmail.com>
References: <YQXPR0101MB096833395FEE6E63590BE7B5DDD60@YQXPR0101MB0968.CANPRD01.PROD.OUTLOOK.COM>
Cc: Chuck Lever <chuck.lever@oracle.com>, Benjamin Kaduk <kaduk@mit.edu>, nfsv4@ietf.org
In-Reply-To: <YQXPR0101MB096833395FEE6E63590BE7B5DDD60@YQXPR0101MB0968.CANPRD01.PROD.OUTLOOK.COM>
To: Rick Macklem <rmacklem@uoguelph.ca>
X-Mailer: iPhone Mail (18B92)
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/wTybY8_EfNJTH60WinlemagR5Zo>
Subject: Re: [nfsv4] NFS over TLS for laptops
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Dec 2020 17:37:48 -0000

Am I the only clueless one who doesn’t understand what “TLS squashing” is or means?  If so I’ll go back to background and try to trawl old emails.  Otherwise, perhaps you could enlighten.

Happy New Year.

Craig


> On Dec 31, 2020, at 11:53 AM, Rick Macklem <rmacklem@uoguelph.ca> wrote:
> 
> Chuck Lever wrote:
>> Ben Kaduk wrote:
>>> 
>>> I suspect that we can find a compromise position, yes.
>>> The certificate still authenticates the client (not the user), and the
>>> client uses AUTH_SYS to claim what user is performing operations.  But the
>>> server uses the client's authenticated identity to restrict, by policy,
>>> what user identities the client is allowed to claim via AUTH_SYS.  In the
>>> degenerate case there is an otherName in the certificate that corresponds
>>> to a single user and the client can only claim that one user, which looks
>>> very similar to just authenticating the user, but we can say that the
>>> relevant policy logic is located in the server as part of its internal
>>> implementation choices.
>> 
>> An NFS client might send legitimate operations as UID 0 too
>> (e.g., lease management). Those cannot be rejected. Perhaps
>> we need to specify that the client has to perform _all_
>> operations as the squashed user.
> Yes. I agree with this.
> My current implementation simply ignores the AUTH_SYS RPC
> credential when TLS squashing is enabled.
> 
>> As a process note, I'm thinking this explanation, a description
>> of the use of otherName, and a summary of the security discussion
>> in this thread ought to go in whichever document discusses how
>> NFS operates on RPC-over-TLS. It seems to be NFS-specific access
>> control behavior.
> My implementation is done in the RPC layer.
> However, since NFS is the main/only Sun RPC consumer and NFS
> is what we do, an NFS specific document seems appropriate to me.
> 
> I do think that TLS squashing done via a database keyed on
> issuer+serial could be a useful alternative (for larger deployments or ...).
> I also think the database structure/access should be specified in detail,
> so that all server implementations can use the same database deployment.
> --> Possibly use secure LDAP?
>       I do not know how to specify LDAP data, but there must
>       be a way?
> I could easily implement that as an optional alternative to otherName
> in the FreeBSD daemon that does the TLS handshake.
> 
>> The alternative is publishing an update to rpc-tls...
>> 
>> 
>>> (There might be some divergence from what Rick has
>>> done for the FreeBSD implementation in terms of the behavior when a client
>>> does try to send some other user information via AUTH_SYS, in terms of
>>> getting "squashed" vs getting rejected, but I suspect that Rick is amenable
>>> to changing that behavior if we come up with some reasoning for why it
>>> makes sense.)
>>> 
> I think the "squash everything" will work best and that already appears to
> be a concensus.
> 
> rick
> 
>> -Ben
>> 
>>> In short, the WG must come to a fresh consensus that either
>>> otherName is OK to do in this scenario, or it must provide an
>>> acceptable alternative.
>>> 
>>> 
>>>>> At that point, we have a real problem. Or maybe just me, as an
>>>>> author of rpc-tls and possibly its descendants, has that problem.
>>>> I do not really see the problem. No is a simple answer.
>>> 
>>> Simple, but problematic. The possible result will be the
>>> promulgation of implementations that do not comply with our
>>> shiny new specification. I think the IETF would view that as
>>> very much a quality-of-specification problem. The usual redress
>>> is to publish an updated protocol specification.
> 
> --
> Chuck Lever
> 
> 
> 
> 
> 
> _______________________________________________
> nfsv4 mailing list
> nfsv4@ietf.org
> https://www.ietf.org/mailman/listinfo/nfsv4