From: Andreas Gruenbacher <agruen@suse.de>
To: nfsv4@ietf.org
Cc: "J. Bruce Fields" <bfields@fieldses.org>,
Lisa Week <Lisa.Week@sun.com>, Sam Falkner <Sam.Falkner@sun.com>,
nfs@lists.sourceforge.net, "Noveck,
Dave" <Dave.Noveck@netapp.com>,
Spencer Shepler <spencer.shepler@sun.com>,
"Pawlowski, Brian" <beepy@netapp.com>
Subject: Re: Re: NFSv4 ACL and POSIX interaction / mask, draft-ietf-nfsv4-acls-00 not ready
Date: Tue, 25 Jul 2006 22:15:16 +0200 [thread overview]
Message-ID: <200607252215.16735.agruen@suse.de> (raw)
In-Reply-To: <04075B08-F57D-4842-A7B2-9467DF9A39A2@Sun.COM>
On Tuesday, 25. July 2006 06:26, Sam Falkner wrote:
> On Jul 24, 2006, at 6:32 PM, a.gruenbacher@computer.org wrote:
> > Looking at draft-ietf-nfsv4-minorversion1-04.txt, I disagree with
> > secion
> > 5.4.1. "Discussion of EVERYONE@".
>
> The fact that you disagree with it is not a flaw. That section is
> very simple -- it says that EVERYONE@ means "everyone".
>
> If you are arguing that EVERYONE@ ACEs should be affected by the
> POSIX "other" class upon chmod(), then that's not in disagreement
> with 5.4.1.
Alright, fine then.
> > Section 5.5. "Mode Attribute" claims that
> > MODE4_RGRP, MODE4_WGRP, MODE4_XGRP apply to the principals
> > identified in the
> > owner_group attribute, while it's really the File Group Class
> > according to POSIX.
>
> Since when does POSIX define NFSv4? RFC 3530 is the current
> authority on NFSv4, and it says that the mode attribute is based upon
> the UNIX mode -- seems sensible to me.
POSIX does not define NFSv4. The mode attribute directly maps to the POSIX
file mode though, and I assume we have agreement on that.
My argument is that there is a conceptual difference between the MODE4_RGRP,
MODE4_WGRP, MODE4_XGRP permission bits (which map to the POSIX File Group
Class) and the owner_group permissions: this has to do with the
classification of ACEs, and with the file access control mechanisms that
POSIX allows.
RFC3530 does not go very deeply into the interactions between the mode
attribute and POSIX. In Section 5.11.5. "Mode Attribute" RFC2530 defines that
the MODE4_RGRP, MODE4_WGRP, MODE4_XGRP bits apply to the principals
identified in the owner_group attribute. This is a less general definition
than how POSIX defines File Permission Bits, which are part of the file mode:
[] File Permission Bits
[]
[] Information about a file that is used, along with other information, to
[] determine whether a process has read, write, or execute/search permission
[] to a file. The bits are divided into three parts: owner, group, and other.
[] Each part is used with the corresponding file class of processes. These
[] bits are contained in the file mode.
On POSIX systems that only support the POSIX File Permission Bits and no other
file access control mechanisms, both definitions amount to the same. On
systems that implement additional file access control mechanisms, the File
Group Class permission bits are no longer necessarily identical with the
permissions granted to the owning group: the definition of Additional File
Access Control Mechanisms allows further restrictions to be imposed. In other
words, the owning group may only be granted a subset of the File Group Class
permissions.
You are arguing that users have been confused by this definition, and that
changing the File Group Class permissions (=changing the MODE4_RGRP,
MODE4_WGRP, MODE4_XGRP bits in the mode attribute) should automatically also
change the owner_group permissions, and that this is how chmod behaves with
POSIX ACLs on Solaris (and which differs from how implementations of POSIX
1003.1e draft 17 (withdrawn) are supposed to behave). In Section 4.6. "Mode
Changes and the OWNER@, GROUP@, and EVERYONE@ ACEs" of
http://www.suse.de/~agruen/nfs4acl/mapping-nfsv4-acls-to-posix-00.html I am
pointing out two reasons why the Solaris behavior is a really bad idea. (Note
that these problems may well be the reason why Solaris appears to behave
differently at the system call level.)
I would be sorry if you persisted in implementing the current Solaris chmod
behavior in NFSv4, but in case you really do, this hack still does not belong
into the NFSv4.1 specification, and I would in that case much prefer if you
could just break Solaris, and not everybody else as well.
> > From that pretty much follows that the algorithm defined in Section
> > 5.6.1. is not POSIX compliant: the File Group Class permissions
> > must be a superset of the permissions of the permissions granted to all
> > ACEs for a who other than OWNER@ and EVERYONE@, and the 5.6.1. algorithm
> > does not guarantee this.
>
> You are arguing that NFSv4 should define MODE4_RGRP, MODE4_WGRP, and
> MODE4_XGRP to be something other than the UNIX mode bits.
No, this is a misunderstanding. I am arguing that the NFSv4 mode attribute map
to the POSIX mode bits, in the precise semantics which POSIX assigns to these
bits.
> The fact that you argue this does not make it a requirement. As stated
> above, RFC 3530 defines these bits as reflecting the mode.
I have above argued within which limits the definition in RFC3530 is correct
with respect to POSIX, and that this definition is not general enough as soon
as ACLs, in the form of additional file access control mechanisms, are used
on POSIX compliant systems.
> ACL is not a required attribute in NFSv4. If we adopted your
> proposal, a client that supported mode but not ACL would be unable to
> set the mode of a file.
Not at all. Maybe you can explain what makes you think so. An application can
set the mode with a mode SETATTR at any time, etc.
> But let's pretend that all NFSv4 clients do support the ACL
> attribute. Having the chmod command unable to set the mode was a
> source of many customer complaints when that was the behavior in
> Solaris (http://xrl.us/pd7c and http://xrl.us/pd7b are just two
> examples of bugs). The Solaris chmod command was fixed to alter the
> POSIX-draft ACL (in file systems that support POSIX-draft ACLs), so
> that chmod was actually able to change the mode. Since making this
> change to chmod, complaints have stopped.
Maybe nobody explained to users how to properly use ACLs to prevent this from
happening? The behavior of Solaris chmod(1) is a potential security hole,
although a small one only.
> So, if we were to do as your proposed design says, and have
> MODE4_RGRP, etc., not reflect the mode, then once again, we would
> have to modify the chmod command to do more than the chmod() system
> call. This is madness.
This is not what I am proposing at all.
> Or, we could simply have MODE4_RGRP, etc., reflect the mode of the file.
This *is* what I am proposing. A mode SETATTR also affects which permissions
are effective in the ACL and which must be disabled, though. Both proposals
disable permissions, but they do so using different mechanisms: your proposal
introduces DENY ACEs spread throughout the ACL. My proposal sets masks, which
are only applied in the access check algorithm. I argue that simply updating
the masks is a much nicer way of achieving the same effect, and that it
avoids the problems inherent to those DENY ACEs.
> > Algorithm 5.6.3. is at least problematic because it enforces implementing
> > masking of permissions using DENY ACEs, while an alternative design exists
> > that achieves the same effects without the disadvantages of those
> > DENY ACEs.
>
> That alternative introduces a new file attribute, which causes
> problems for NFSv4.0, and for Windows servers.
That's not true. There are several ways how we can deal with clients that do
not understand masks:
(1) we can apply the masks before exposing the ACL to such clients, or
(2) we can introduce DENY ACEs where necessary, as per your proposal.
With (2), we are back to the problems with DENY ACEs: clients which reorder
ACEs as (at least some versions of) Windows do will cause havoc. *But* we
will never run into any such effects with clients that *do* understand masks,
we don't have to bloat ACLs all the time,
On the other hand, with (1), an ACL read-modify-write cycle will potentially
lose some information, but the huge benefit is that the ACLs that clients
will see will actually make some sense to them, instead of being littered
with DENY ACEs that nobody will know how to deal with. Of course clients that
understand masks will be fine as well.
With both mechanisms, knocking the right mask bits in place in the ACL will
cause these bits to become effective (provided that other ACEs don't deny
them earlier in the ACL).
> > The paragraphs below "3. To conform with POSIX" is lossy, even with the
> > six-entry ACL that "2. If there are at least six ACEs" would
> > create, which is a very unfavorable property.
>
> No, it is not lossy with the six-entry ACE in "2. ...". That's
> because the six-entry ACE in "2." will be adjusted in the "3."
> immediately following "2.".
>
> In general, the algorithm can be lossy, when modes such as 077 are
> assigned to files having ACLs that grant read/write/execute to
> supplemental groups.
Exactly, the algorithm is lossy with supplemental groups. I misread that "3.
To conform with POSIX" only applies to explicit groups. My point still stands
though.
Where does the algorithm deal with explicit users?
Masks are not lossy per se, they will only become lossy when talking to
clients that don't understand masks (and in those cases, the effects will
never be worse than with DENY ACEs).
> > It also does not cover the case where the owner
> > is granted permissions from EVERYONE@ ACEs, or where users or
> > groups matching
> > user@domain or group@domain are granted permissions from EVERYONE@
> > ACEs.
>
> EVERYONE@ ACEs are covered. Re-read the algorithm.
Ah, I see now, "3. To conform with POSIX" only refers to explicit groups.
> > I can't see a compelling reason for requiring the exact six-entry
> > ACL as specified in "2. If there are at least six ACEs".
>
> The goal of that step is to re-use the final six ACEs if possible, so
> that successive changes to the mode don't cause a growing ACL.
There is no reason for requiring this exact six-entry ACL other that that the
algorithm you have chosen relies on this exact form. Other algorithms may be
just fine with something completely different. I don't think that NFSv4.1
should limit implementations in ways like this.
> > Finally, I have argued why it is wrong to have a mode SETATTR write
> > through to USER@, GROUP@, and EVERYONE@ ACEs.
>
> To not do so leaves you in the situation where a client that supports
> the mode attribute and not the ACL attribute cannot set the mode.
Not true. What makes you think so?
Andreas
_______________________________________________
nfsv4 mailing list
nfsv4@ietf.org
https://www1.ietf.org/mailman/listinfo/nfsv4
next prev parent reply other threads:[~2006-07-25 20:15 UTC|newest]
Thread overview: 35+ messages / expand[flat|nested] mbox.gz Atom feed top
2006-07-21 15:10 Re: NFSv4 ACL and POSIX interaction / mask, draft-ietf-nfsv4-acls-00 not ready Noveck, Dave
2006-07-21 18:10 ` J. Bruce Fields
2006-07-23 15:47 ` Sam Falkner
2006-07-25 0:32 ` [nfsv4] " a.gruenbacher
2006-07-25 4:26 ` Sam Falkner
2006-07-25 20:15 ` Andreas Gruenbacher [this message]
2006-07-26 4:59 ` Sam Falkner
2006-07-26 13:00 ` [nfsv4] " J. Bruce Fields
2006-08-03 13:46 ` Andreas Gruenbacher
2006-08-04 0:30 ` Andreas Gruenbacher
2006-08-04 1:37 ` Sam Falkner
2006-08-04 10:35 ` Andreas Gruenbacher
2006-08-04 11:19 ` Andreas Gruenbacher
2006-08-04 20:20 ` Sam Falkner
-- strict thread matches above, loose matches on Subject: below --
2006-07-21 17:16 Yoder, Alan
2006-07-19 1:48 Noveck, Dave
2006-07-20 22:57 ` Sam Falkner
2006-07-08 15:04 Noveck, Dave
2006-07-10 8:07 ` [nfsv4] " Andreas Gruenbacher
2006-07-10 14:24 ` J. Bruce Fields
2006-07-10 15:25 ` Spencer Shepler
2006-07-10 23:48 ` Andreas Gruenbacher
2006-07-11 0:09 ` J. Bruce Fields
2006-07-03 21:10 NFSv4 ACL and POSIX interaction / mask Andreas Gruenbacher
2006-07-07 11:55 ` NFSv4 ACL and POSIX interaction / mask, draft-ietf-nfsv4-acls-00 not ready Andreas Gruenbacher
2006-07-08 3:45 ` Sam Falkner
2006-07-08 6:51 ` [nfsv4] " Lisa Week
2006-07-10 21:09 ` Andreas Gruenbacher
2006-07-08 14:32 ` Sam Falkner
2006-07-09 16:22 ` [nfsv4] " Andreas Gruenbacher
2006-07-10 13:29 ` Sam Falkner
2006-07-10 14:15 ` [nfsv4] " J. Bruce Fields
2006-07-10 15:32 ` Sam Falkner
2006-07-11 0:15 ` Andreas Gruenbacher
2006-07-11 5:42 ` [nfsv4] " Sam Falkner
2006-07-11 8:05 ` Andreas Gruenbacher
2006-07-11 12:29 ` [nfsv4] " Sam Falkner
2006-07-11 13:46 ` J. Bruce Fields
2006-07-11 0:01 ` Andreas Gruenbacher
2006-07-10 22:50 ` Andreas Gruenbacher
2006-07-11 6:17 ` [nfsv4] " Sam Falkner
2006-07-11 8:45 ` Andreas Gruenbacher
2006-07-11 6:50 ` [nfsv4] " Lisa Week
2006-07-27 0:59 ` Andreas Gruenbacher
2006-07-27 2:57 ` Andreas Gruenbacher
2006-07-28 6:32 ` Lisa Week
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=200607252215.16735.agruen@suse.de \
--to=agruen@suse.de \
--cc=Dave.Noveck@netapp.com \
--cc=Lisa.Week@sun.com \
--cc=Sam.Falkner@sun.com \
--cc=beepy@netapp.com \
--cc=bfields@fieldses.org \
--cc=nfs@lists.sourceforge.net \
--cc=nfsv4@ietf.org \
--cc=spencer.shepler@sun.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.