From: James Bottomley <James.Bottomley@HansenPartnership.com>
To: Jeffrey Altman <jaltman@auristor.com>
Cc: linux-fsdevel <linux-fsdevel@vger.kernel.org>,
containers@lists.linux-foundation.org,
lsf-pc@lists.linux-foundation.org
Subject: Re: [Lsf-pc] Authentication Contexts for network file systems and Containers was Re: [LSF/MM ATTEND] FS jitter testing, network caching, Lustre, cluster filesystems.
Date: Mon, 16 Jan 2017 13:03:25 -0800 [thread overview]
Message-ID: <1484600605.2540.73.camel@HansenPartnership.com> (raw)
In-Reply-To: <c663a698-7116-76ac-25ee-c0ea35971a05@auristor.com>
On Mon, 2017-01-16 at 15:39 -0500, Jeffrey Altman wrote:
> Error verifying signature: parse error
> --------------ms000508080908050405010401
> Content-Type: multipart/mixed;
> boundary="------------049F6401F78BABEBFB8F74AC"
>
> This is a multi-part message in MIME format.
> --------------049F6401F78BABEBFB8F74AC
> Content-Type: text/plain; charset=utf-8
> Content-Transfer-Encoding: quoted-printable
>
> On 1/16/2017 12:46 PM, James Bottomley wrote:
> >
> > For identity, doesn't the UTS namespace do this? If not, what is
> > missing?
> > =20
> > James
>
> James,
>
> Thanks for posing the question.
>
> Unless I'm missing something, the UTS namespace permits an alternate
> 'hostname' and NIS 'domainname' to be specified for local visibility
> to the processes running in the container.
>
> For an /afs network file system client (kafs, OpenAFS or AuriStorFS)
> the kernel module must be able to associate each process with an
> authentication context. The AFS family of file systems have
> implemented this binding as part of its Process Authentication Group
> (PAG) concept. A PAG is a set of processes that share an
> authentication context. The authentication context includes:
[...]
OK, so snipping all the details: it's a per process property and
inherited, I don't even see that it needs anything container specific.
The pid namespace should be sufficient to keep any potential security
leaks contained and the inheritance model should just work with
containers.
> While a file system can internally create an association between an
> authentication content with a file descriptor once it is created and
> with pages for write-back, I believe there would be benefit from a
> more generic method of tracking authentication contexts in file
> descriptors and pages. In particular would be better defined
> behavior when a file has been opened for "write" from processes
> associated with more than one authentication context.
As long as an "authentication" becomes a property of a file descriptor
(like a token), then I don't see any container problems: fds are
namespace blind, so they can be passed between containers and your
authorizations would go with them. If you need to go back to a process
as part of the authorization, then there would be problems because
processes are namespaced.
> For example, the problems that AFS is currently experiencing with
> systemd. A good description of problem by Jonathan Billings can be
> found at
>
>
> https://docs.google.com/document/d/1P27fP1uj-C8QdxDKMKtI-Qh00c5_9zJa4
> YHjn=pB6ODM/pub
This is giving me "Sorry, the file you have requested does not exist."
James
next prev parent reply other threads:[~2017-01-16 21:03 UTC|newest]
Thread overview: 19+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-01-15 23:38 [LSF/MM ATTEND] FS jitter testing, network caching, Lustre, cluster filesystems Oleg Drokin
2017-01-16 17:17 ` J. Bruce Fields
2017-01-16 17:23 ` Jeffrey Altman
2017-01-16 17:42 ` Chuck Lever
2017-01-16 17:46 ` James Bottomley
2017-01-16 20:39 ` Authentication Contexts for network file systems and Containers was " Jeffrey Altman
2017-01-16 21:03 ` James Bottomley [this message]
2017-01-17 16:29 ` [Lsf-pc] " Jeffrey Altman
2017-01-17 16:34 ` Trond Myklebust
2017-01-17 17:10 ` Jeffrey Altman
2017-01-16 17:32 ` [Lsf-pc] " James Bottomley
2017-01-16 18:02 ` Oleg Drokin
2017-01-16 18:21 ` James Bottomley
2017-01-16 18:39 ` Oleg Drokin
2017-01-16 20:58 ` James Bottomley
2017-01-17 7:00 ` Oleg Drokin
2017-01-17 14:26 ` James Bottomley
2017-01-17 17:41 ` Oleg Drokin
2017-01-17 14:56 ` James Bottomley
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1484600605.2540.73.camel@HansenPartnership.com \
--to=james.bottomley@hansenpartnership.com \
--cc=containers@lists.linux-foundation.org \
--cc=jaltman@auristor.com \
--cc=linux-fsdevel@vger.kernel.org \
--cc=lsf-pc@lists.linux-foundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).