Re: [nfsv4] No WG meeting for IETF 91

Dave Quigley <dpquigl@davequigley.com> Wed, 08 October 2014 00:46 UTC

Return-Path: <dpquigl@davequigley.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7A9DC1A8AC0 for <nfsv4@ietfa.amsl.com>; Tue, 7 Oct 2014 17:46:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id u3BSecQ-eYxC for <nfsv4@ietfa.amsl.com>; Tue, 7 Oct 2014 17:46:08 -0700 (PDT)
Received: from countercultured.net (countercultured.net [IPv6:2001:470:0:c0d3::2]) by ietfa.amsl.com (Postfix) with SMTP id A21541A8ABD for <nfsv4@ietf.org>; Tue, 7 Oct 2014 17:46:08 -0700 (PDT)
Received: (qmail 17467 invoked from network); 8 Oct 2014 00:46:04 -0000
Received: from pool-108-3-221-151.bltmmd.fios.verizon.net (HELO ?192.168.1.24?) (merlin@108.3.221.151) by countercultured.net with ESMTPA; 8 Oct 2014 00:46:04 -0000
Message-ID: <5434894F.1070702@davequigley.com>
Date: Tue, 07 Oct 2014 20:46:07 -0400
From: Dave Quigley <dpquigl@davequigley.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: nfsv4@ietf.org
References: <C699D0A3-0D71-486A-BBD7-200F080FF9FF@primarydata.com> <OFADD0E9F6.6E3DBF88-ON88257D62.007DF830-88257D62.0082F48D@us.ibm.com> <32576F67-F5E8-4E6B-9790-361C8296A274@primarydata.com> <OF9870EDF8.EAEAC5A2-ON88257D65.007CEEA2-88257D65.0080512B@us.ibm.com> <20141003030630.GA20584@fieldses.org> <20141003180014.GA4701@fieldses.org> <CAABAsM7BbrMpMoSjwXvxtY1A27g3bJ8urAtpBh1QZ3L5+-yysA@mail.gmail.com> <20141003190419.GC4701@fieldses.org> <OF66DFA0A8.35491496-ON88257D66.006A8A33-88257D66.006DDA48@us.ibm.com> <49F767A3-B812-4E84-B629-A71258897CB9@primarydata.com> <20141004071114.GA11181@lst.de>
In-Reply-To: <20141004071114.GA11181@lst.de>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/nfsv4/xgP_6m8s5u8twEsG1YiTULF1t68
Subject: Re: [nfsv4] No WG meeting for IETF 91
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Oct 2014 00:46:10 -0000

On 10/4/2014 3:11 AM, Christoph Hellwig wrote:
> On Sat, Oct 04, 2014 at 12:24:30AM -0400, Thomas Haynes wrote:
>> The argument being presented is that we should support xattrs
>> because they are there.
>>
>> What drives us to take the work? Where do we lose "customers"
>> if we do not do xattrs?
>
> That didn't seem to matter when adding named attribute support to
> NFSv4 :)  Not that I'm arguing for adding extattrs, especially in
> the form of the draft, but it seems like the standards fortunately
> are higher now.
>
>> What is the use case that makes us want to do it?
>>
>> How do different client OSes interact?
>> a) In namespaces
>> b) Securely
>> c) With the limits
>
> As someone who has worked with Linux xattrs for a long time, I think
> the Linux concept of the text prefixes for nightmares which have
> semantic meanings is a nightmare.  I don't really understand why and
> how it made it into Linux, as the original IRIX version had binary
> namespaces, as does FreeBSD.
>
> The current version of draft-naik-nfsv4-xattrs-01 totally ignores
> the issue of access control to different namespaces.  To be actually
> interoperable between Linux, FreeBSD, MacOS and Window (and more theoretically
> OS/2 and IRIX) it should be defined to operate on only what Linux calls
> "user." xattrs, FreeBSD calls EXTATTR_NAMESPACE_USER extattrs, IRIX calls
> user namespace attrs, and the the only one available to the rest.
>
> If we actually expose the Linux prefixes we create a giant inteoperability
> problem with unspecified mappings, including an expectation of Linux clients
> that they could store the attribute types that have security implications
> on servers that can not enforce anything like that.
>

I agree with this and I would pretty vocal in my stance against 
exporting security.* The security.* and trusted.* namespaces shouldn't 
be seen outside of the local box.


> Note that all of the kernel-implemented Linux xattrs in these namespaces
> are a blatant abuse of the xattr user interface and should have used
> different system calls as they don't have binary blob semantics, so if
> we plant to support them in NFSv4 they should probably be different
> operations.  All the important cases are already handled in a way more
> (labels) or less (ACLs) suitable already.
>
> _______________________________________________
> nfsv4 mailing list
> nfsv4@ietf.org
> https://www.ietf.org/mailman/listinfo/nfsv4
>