From: Trond Myklebust <trondmy-7I+n7zu2hftEKMMhf/gKZA@public.gmane.org>
To: "jaltman-hRzEac23uH1Wk0Htik3J/w@public.gmane.org"
<jaltman-hRzEac23uH1Wk0Htik3J/w@public.gmane.org>,
"James.Bottomley-d9PhHud1JfjCXq6kfMZ53/egYHeGw8Jk@public.gmane.org"
<James.Bottomley-d9PhHud1JfjCXq6kfMZ53/egYHeGw8Jk@public.gmane.org>
Cc: "linux-fsdevel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org"
<linux-fsdevel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>,
"containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org"
<containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org>,
"lsf-pc-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org"
<lsf-pc-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org>
Subject: Re: [Lsf-pc] Authentication Contexts for network file systems and Containers was Re: [LSF/MM ATTEND] FS jitter testing, network caching, Lustre, cluster filesystems.
Date: Tue, 17 Jan 2017 16:34:15 +0000 [thread overview]
Message-ID: <1484670853.4725.1.camel@primarydata.com> (raw)
In-Reply-To: <7ba053a6-90af-ffc6-e8cd-9bfe0be41a18-hRzEac23uH1Wk0Htik3J/w@public.gmane.org>
On Tue, 2017-01-17 at 11:29 -0500, Jeffrey Altman wrote:
> Error verifying signature: parse error
> On 1/16/2017 4:03 PM, James Bottomley wrote:
> > [...]
> >
> > OK, so snipping all the details: it's a per process property and
> > inherited, I don't even see that it needs anything container
> > specific.
> > The pid namespace should be sufficient to keep any potential
> > security
> > leaks contained and the inheritance model should just work with
> > containers.
>
> Agreed.
>
> > > While a file system can internally create an association between
> > > an
> > > authentication content with a file descriptor once it is created
> > > and
> > > with pages for write-back, I believe there would be benefit from
> > > a
> > > more generic method of tracking authentication contexts in file
> > > descriptors and pages. In particular would be better defined
> > > behavior when a file has been opened for "write" from processes
> > > associated with more than one authentication context.
> >
> > As long as an "authentication" becomes a property of a file
> > descriptor
> > (like a token), then I don't see any container problems: fds are
> > namespace blind, so they can be passed between containers and your
> > authorizations would go with them. If you need to go back to a
> > process
> > as part of the authorization, then there would be problems because
> > processes are namespaced.
> >
> > > For example, the problems that AFS is currently experiencing with
> > > systemd. A good description of problem by Jonathan Billings can
> > > be
> > > found at
> > >
> > >
> > > https://docs.google.com/document/d/1P27fP1uj-C8QdxDKMKtI-Qh00c5_9
> > > zJa4
> > > YHjn=pB6ODM/pub
> >
> > This is giving me "Sorry, the file you have requested does not
> > exist."
>
> Not sure how an extra '=' got in there.
>
> https://docs.google.com/document/d/1P27fP1uj-C8QdxDKMKtI-Qh00c5_9zJa4
> YHjnpB6ODM/pub
>
> Jeffrey Altman
>
There is the usual problem when you have to do an upcall in order to
set up the authentication context for session based protocols, such as
RPCSEC_GSS.
--
Trond Myklebust
Linux NFS client maintainer, PrimaryData
trond.myklebust@primarydata.com
_______________________________________________
Containers mailing list
Containers@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/containers
WARNING: multiple messages have this Message-ID (diff)
From: Trond Myklebust <trondmy@primarydata.com>
To: "jaltman@auristor.com" <jaltman@auristor.com>,
"James.Bottomley@HansenPartnership.com"
<James.Bottomley@HansenPartnership.com>
Cc: "containers@lists.linux-foundation.org"
<containers@lists.linux-foundation.org>,
"lsf-pc@lists.linux-foundation.org"
<lsf-pc@lists.linux-foundation.org>,
"linux-fsdevel@vger.kernel.org" <linux-fsdevel@vger.kernel.org>
Subject: Re: [Lsf-pc] Authentication Contexts for network file systems and Containers was Re: [LSF/MM ATTEND] FS jitter testing, network caching, Lustre, cluster filesystems.
Date: Tue, 17 Jan 2017 16:34:15 +0000 [thread overview]
Message-ID: <1484670853.4725.1.camel@primarydata.com> (raw)
In-Reply-To: <7ba053a6-90af-ffc6-e8cd-9bfe0be41a18@auristor.com>
On Tue, 2017-01-17 at 11:29 -0500, Jeffrey Altman wrote:
> Error verifying signature: parse error
> On 1/16/2017 4:03 PM, James Bottomley wrote:
> > [...]
> >
> > OK, so snipping all the details: it's a per process property and
> > inherited, I don't even see that it needs anything container
> > specific.
> > The pid namespace should be sufficient to keep any potential
> > security
> > leaks contained and the inheritance model should just work with
> > containers.
>
> Agreed.
>
> > > While a file system can internally create an association between
> > > an
> > > authentication content with a file descriptor once it is created
> > > and
> > > with pages for write-back, I believe there would be benefit from
> > > a
> > > more generic method of tracking authentication contexts in file
> > > descriptors and pages. In particular would be better defined
> > > behavior when a file has been opened for "write" from processes
> > > associated with more than one authentication context.
> >
> > As long as an "authentication" becomes a property of a file
> > descriptor
> > (like a token), then I don't see any container problems: fds are
> > namespace blind, so they can be passed between containers and your
> > authorizations would go with them. If you need to go back to a
> > process
> > as part of the authorization, then there would be problems because
> > processes are namespaced.
> >
> > > For example, the problems that AFS is currently experiencing with
> > > systemd. A good description of problem by Jonathan Billings can
> > > be
> > > found at
> > >
> > >
> > > https://docs.google.com/document/d/1P27fP1uj-C8QdxDKMKtI-Qh00c5_9
> > > zJa4
> > > YHjn=pB6ODM/pub
> >
> > This is giving me "Sorry, the file you have requested does not
> > exist."
>
> Not sure how an extra '=' got in there.
>
> https://docs.google.com/document/d/1P27fP1uj-C8QdxDKMKtI-Qh00c5_9zJa4
> YHjnpB6ODM/pub
>
> Jeffrey Altman
>
There is the usual problem when you have to do an upcall in order to
set up the authentication context for session based protocols, such as
RPCSEC_GSS.
--
Trond Myklebust
Linux NFS client maintainer, PrimaryData
trond.myklebust@primarydata.com
next prev parent reply other threads:[~2017-01-17 16:34 UTC|newest]
Thread overview: 33+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-01-15 23:38 [LSF/MM ATTEND] FS jitter testing, network caching, Lustre, cluster filesystems Oleg Drokin
2017-01-16 17:17 ` J. Bruce Fields
2017-01-16 17:23 ` Jeffrey Altman
2017-01-16 17:42 ` Chuck Lever
2017-01-16 17:46 ` James Bottomley
[not found] ` <1484588818.2540.43.camel-d9PhHud1JfjCXq6kfMZ53/egYHeGw8Jk@public.gmane.org>
2017-01-16 20:39 ` Authentication Contexts for network file systems and Containers was " Jeffrey Altman
2017-01-16 20:39 ` Jeffrey Altman
[not found] ` <c663a698-7116-76ac-25ee-c0ea35971a05-hRzEac23uH1Wk0Htik3J/w@public.gmane.org>
2017-01-16 21:03 ` [Lsf-pc] " James Bottomley
2017-01-16 21:03 ` James Bottomley
[not found] ` <1484600605.2540.73.camel-d9PhHud1JfjCXq6kfMZ53/egYHeGw8Jk@public.gmane.org>
2017-01-17 16:29 ` Jeffrey Altman
2017-01-17 16:29 ` Jeffrey Altman
[not found] ` <7ba053a6-90af-ffc6-e8cd-9bfe0be41a18-hRzEac23uH1Wk0Htik3J/w@public.gmane.org>
2017-01-17 16:34 ` Trond Myklebust [this message]
2017-01-17 16:34 ` Trond Myklebust
[not found] ` <1484670853.4725.1.camel-7I+n7zu2hftEKMMhf/gKZA@public.gmane.org>
2017-01-17 17:10 ` Jeffrey Altman
2017-01-17 17:10 ` Jeffrey Altman
[not found] ` <D863EDBD-277B-4CC3-854F-D57FF4501542-SOTZviwpzew/JUsKyNonYw@public.gmane.org>
2017-01-16 17:32 ` [Lsf-pc] " James Bottomley
2017-01-16 17:32 ` James Bottomley
[not found] ` <1484587952.2540.42.camel-d9PhHud1JfjCXq6kfMZ53/egYHeGw8Jk@public.gmane.org>
2017-01-16 18:02 ` Oleg Drokin
2017-01-16 18:02 ` Oleg Drokin
[not found] ` <F7FABA22-8B7D-4C77-A360-4454A5571C8F-SOTZviwpzew/JUsKyNonYw@public.gmane.org>
2017-01-16 18:21 ` James Bottomley
2017-01-16 18:21 ` James Bottomley
[not found] ` <1484590862.2540.51.camel-d9PhHud1JfjCXq6kfMZ53/egYHeGw8Jk@public.gmane.org>
2017-01-16 18:39 ` Oleg Drokin
2017-01-16 18:39 ` Oleg Drokin
[not found] ` <9CA51BCE-7FF9-4212-9C43-B8B3667E7E6D-SOTZviwpzew/JUsKyNonYw@public.gmane.org>
2017-01-16 20:58 ` James Bottomley
2017-01-16 20:58 ` James Bottomley
[not found] ` <1484600330.2540.69.camel-d9PhHud1JfjCXq6kfMZ53/egYHeGw8Jk@public.gmane.org>
2017-01-17 7:00 ` Oleg Drokin
2017-01-17 7:00 ` Oleg Drokin
[not found] ` <AE738992-D640-48B1-B7C3-E4E798504F7A-SOTZviwpzew/JUsKyNonYw@public.gmane.org>
2017-01-17 14:26 ` James Bottomley
2017-01-17 14:26 ` James Bottomley
[not found] ` <1484663167.2433.8.camel-d9PhHud1JfjCXq6kfMZ53/egYHeGw8Jk@public.gmane.org>
2017-01-17 17:41 ` Oleg Drokin
2017-01-17 17:41 ` Oleg Drokin
2017-01-17 14:56 ` James Bottomley
2017-01-17 14:56 ` James Bottomley
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1484670853.4725.1.camel@primarydata.com \
--to=trondmy-7i+n7zu2hftekmmhf/gkza@public.gmane.org \
--cc=James.Bottomley-d9PhHud1JfjCXq6kfMZ53/egYHeGw8Jk@public.gmane.org \
--cc=containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org \
--cc=jaltman-hRzEac23uH1Wk0Htik3J/w@public.gmane.org \
--cc=linux-fsdevel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org \
--cc=lsf-pc-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.