From: Nicolas Williams <Nicolas.Williams@sun.com>
To: Jarrett Lu <Jarrett.Lu@sun.com>
Cc: Stephen Smalley <sds@tycho.nsa.gov>,
labeled-nfs@linux-nfs.org, selinux@tycho.nsa.gov,
nfs-discuss@opensolaris.org, nfsv4@ietf.org
Subject: Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
Date: Wed, 1 Apr 2009 12:50:12 -0500 [thread overview]
Message-ID: <20090401175012.GF9992@Sun.COM> (raw)
In-Reply-To: <49D2E073.3060003@sun.com>
On Tue, Mar 31, 2009 at 08:33:07PM -0700, Jarrett Lu wrote:
> Nicolas Williams wrote:
> >On Mon, Mar 30, 2009 at 10:59:15PM -0700, Jarrett Lu wrote:
> >
> >>That's certainly one option. We can say DOI + an opaque field is what we
> >>will add to NFSv4 protocol. Use the information as you see fit. Going
> >>
> >
> >That's what David's I-D and what my RPCSEC_GSSv3 I-D both say now.
> >
>
> If we stop here, we don't have much of an interoperability story. I
I don't agree. We'd have the same interop story everyone has today
w.r.t. labeling: synchronization of policies is an out-of-band, manual
(automatable) task; no standard protocol nor policy description
language is specified.
Note: I'm not saying that I don't want us to do better. Rather, I'm
saying that we should consider whether to: a) proceed as now, b) also
separately and independently solve the policy agreement issues, c) make
the labeled NFSv4 work dependent on a solution to the policy agreement
issues.
I'm in favor of (a) and (b), but if we can reach consensus on a sketch
of a policy agreement solution, then I'd be willing to go for (c).
I.e., we should be realistic about what we can accomplish.
> >Signature of security policy is certainly an interesting idea! But it
> >does require defining a standard security policy description syntax --
> >that's work that I think is well outside what this WG should be working
> >on. (Also, we'll need hash function agility.)
> >
> >Therefore I think the NFSv4 community should stop at either
> >
>
> I'm in general agreement with you on this. I am not sure to what extent
> the extensibility stuff makes sense, e.g. how much may be enough? I
> guess we need to study more use scenarios. I suspect TE systems may have
> more challenges in this area, just because security policies on TE
> systems tend to be more flexible. For example, how many things are
> critical in order to translate label correctly, OS version, vendor,
> label parser, security policy file? How likely DTE systems are
> configured with exact same policy files? Does it make sense that a
> (harmless) update to security policy file causes label translation
> failures from that point on?
I've re-thought this a bit. I think we need the policy agreement parts
to be:
- provided by authentication mechanisms where possible (PKIX cert
extensions, Kerberos V authz-data, SAML assertions, ...)
- exchanged by the client and server via a new operation
The label should remain {DOI #, octet string}. Clients and servers that
can reach policy agreement via out-of-band mechanisms will need no
authentication mechanism extensions, nor any NFSv4 policy agreement
operations. Other clients and servers would use whatever policy
agreement mechanism is available to them, preferably authentication
mechanism extensions.
Policy agreement should consist of a sequence of {DOI #, policy encoding
type, hash function algorithm, hash of policy}. If a client and server
have one common policy for one or more DOIs then they can use those
DOIs. For all DOIs they don't agree on they'd fail to move bits (or
whatever is the preferred outcome).
> >[comments about where to do what work elided]
>
> No disagreement here either. At the end of this scoping exercise, we'll
> hopefully know how big a bite we can chew. I believe the DOI + opaque
> field may be useful to identical or compatible system under same
> administrative control. To push David's draft forward, I believe we
> still need to understand more about how different systems may use the
> opaque field and decide if it makes sense to propose extensibility
> fields for future use.
Agreed.
Nico
--
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2009-04-01 17:50 UTC|newest]
Thread overview: 60+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-01-22 19:16 New MAC label support Internet Draft posted to IETF website David P. Quigley
[not found] ` <54E18340-3542-4AB4-843E-E92A67B709A7@storspeed.com>
2009-01-23 17:47 ` [nfsv4] " Peter Staubach
2009-01-23 21:59 ` Glenn Faden
2009-01-23 19:07 ` [Labeled-nfs] " Kevin L. Smith
[not found] ` <33B70CB9-5260-419A-98CF-94847F829570@nokia.com>
2009-01-28 1:17 ` Jarrett Lu
2009-02-09 22:24 ` Peter Staubach
2009-02-11 23:47 ` David P. Quigley
2009-02-12 1:07 ` [Labeled-nfs] " James Morris
2009-02-12 15:36 ` [nfsv4] " Nicolas Williams
2009-02-12 20:00 ` David P. Quigley
2009-02-12 20:11 ` Nicolas Williams
2009-02-17 16:50 ` David P. Quigley
2009-02-17 17:00 ` Nicolas Williams
2009-02-12 19:45 ` David P. Quigley
2009-02-12 15:22 ` [nfsv4] " Nicolas Williams
2009-03-12 16:08 ` David P. Quigley
2009-03-12 17:20 ` Peter Staubach
2009-03-25 8:52 ` Jarrett Lu
2009-03-25 16:33 ` [nfsv4] " Nicolas Williams
2009-03-26 9:25 ` Jarrett Lu
2009-03-26 15:09 ` Nicolas Williams
2009-03-26 22:03 ` Jarrett Lu
2009-03-27 0:11 ` Nicolas Williams
2009-03-27 12:55 ` [Labeled-nfs] " Stephen Smalley
2009-03-27 13:22 ` Stephen Smalley
2009-03-27 17:03 ` Jarrett Lu
2009-03-27 17:26 ` [nfsv4] [Labeled-nfs] " Nicolas Williams
2009-03-27 18:56 ` Jarrett Lu
2009-03-27 22:04 ` Nicolas Williams
2009-03-30 17:37 ` Stephen Smalley
2009-03-30 18:30 ` Jarrett Lu
2009-03-30 20:01 ` Nicolas Williams
2009-03-30 20:03 ` Nicolas Williams
2009-03-30 21:14 ` Stephen Smalley
2009-03-31 5:59 ` Jarrett Lu
2009-03-31 18:28 ` Nicolas Williams
2009-04-01 3:33 ` Jarrett Lu
2009-04-01 6:58 ` [Labeled-nfs] [nfsv4] " James Morris
2009-04-01 8:09 ` Jarrett Lu
2009-04-01 9:49 ` James Morris
2009-04-01 17:50 ` Nicolas Williams [this message]
2009-04-02 23:43 ` [nfsv4] [Labeled-nfs] " Jarrett Lu
2009-03-31 3:07 ` Casey Schaufler
2009-03-31 14:47 ` Paul Moore
2009-04-01 7:46 ` Jarrett Lu
2009-04-01 16:46 ` Paul Moore
2009-04-02 15:24 ` Nicolas Williams
2009-04-02 22:35 ` Paul Moore
2009-04-03 4:42 ` Nicolas Williams
2009-04-03 18:08 ` Joy Latten
2009-04-03 1:21 ` Jarrett Lu
2009-04-07 21:30 ` Paul Moore
2009-03-31 18:34 ` Nicolas Williams
2009-04-01 3:42 ` Casey Schaufler
2009-03-28 3:33 ` [Labeled-nfs] [nfsv4] " Casey Schaufler
2009-03-28 5:16 ` Glenn Faden
2009-03-28 5:52 ` Casey Schaufler
2009-03-27 22:09 ` Nicolas Williams
2009-03-30 16:51 ` Stephen Smalley
2009-03-30 20:05 ` Nicolas Williams
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20090401175012.GF9992@Sun.COM \
--to=nicolas.williams@sun.com \
--cc=Jarrett.Lu@sun.com \
--cc=labeled-nfs@linux-nfs.org \
--cc=nfs-discuss@opensolaris.org \
--cc=nfsv4@ietf.org \
--cc=sds@tycho.nsa.gov \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.