From: Tom Tucker <tom@opengridcomputing.com>
To: "J. Bruce Fields" <bfields@fieldses.org>
Cc: linux-nfs@vger.kernel.org
Subject: Re: [PATCH 10/10] svcrdma: Documentation update for the FastReg memory model
Date: Thu, 25 Sep 2008 08:35:26 -0500 [thread overview]
Message-ID: <48DB939E.4090503@opengridcomputing.com> (raw)
In-Reply-To: <20080924212102.GD10841@fieldses.org>
J. Bruce Fields wrote:
> On Tue, Sep 16, 2008 at 06:34:39AM -0500, Tom Tucker wrote:
>> This patch adds security related documentation to the nfs-rdma.txt file
>> that describes the memory registration model, the potential security
>> exploits, and compares these exploits to a similar threat when using TCP
>> as the transport.
>
> Thanks for doing this.
>
>> Signed-off-by: Tom Tucker <tom@opengridcomputing.com>
>>
>> ---
>> Documentation/filesystems/nfs-rdma.txt | 66 ++++++++++++++++++++++++++++++++
>> 1 files changed, 66 insertions(+), 0 deletions(-)
>>
>> diff --git a/Documentation/filesystems/nfs-rdma.txt b/Documentation/filesystems/nfs-rdma.txt
>> index 44bd766..41f0fb2 100644
>> --- a/Documentation/filesystems/nfs-rdma.txt
>> +++ b/Documentation/filesystems/nfs-rdma.txt
>> @@ -269,3 +269,69 @@ NFS/RDMA Setup
>> the "proto" field for the given mount.
>>
>> Congratulations! You're using NFS/RDMA!
>> +
>> +Security
>> +--------
>> +
>> + NFSRDMA exploits the RDMA capabilities of the IB and iWARP
>> + transports to more efficiently exchange RPC data between the client
>> + and the server. This section discusses the security implications of
>> + the exchange of memory information on the wire when the wire may be
>> + monitorable by an untrusted application. The identifier that
>> + encapsulates this memory information is called an RKEY.
>> +
>> + A principal exploit is that a node listening on a mirror port of a
>> + switch
>
> There are probably always other ways to do trick the switch into sending
> an attacker some of the traffic. It might be simpler just to say "a
> node on the local network".
Ok.
>
>> + could snoop RDMA packets containing RKEY and then forge a
>> + packet with this RKEY to write and/or read the memory of the peer to
>> + which the RKEY referred.
>> +
>> + The NFSRDMA protocol is defined such that a) only the server
>> + initiates RDMA, and b) only the client's memory is exposed via
>> + RKEY. This is why the server reads to fetch RPC data from the client
>> + even though it would be more efficient for the client to write the
>> + data to the server's memory. This design goal is not entirely
>> + realized with iWARP, however, because the RKEY (called an STag on
>> + iWARP) for the data sink of an RDMA_READ is actually placed on the
>> + wire, and this RKEY has Remote Write permission. This means that the
>> + server's memory is exposed by virtue of having placed the RKEY for
>> + it's local memory on the wire in order to receive the result of the
>
> s/it's/its/
>
Yes, erf.
>> + RDMA_READ.
>> +
>> + By contrast, IB uses an opaque transaction ID# to associate the
>> + READ_RPL with the READ_REQ and the data sink of an READ_REQ does not
>> + require remote access. That said, the byzantine node in question
>> + could forge a packet with this transaction ID and corrupt the target
>> + memory, however, the scope of the exploit is bounded to the lifetime
>> + of this single RDMA_READ request and to the memory mapped by the
>> + data sink of the READ_REQ.
>> +
>> + The newer RDMA adapters (both iWARP and IB) support "Fast Memory
>> + Registration". This capability allows memory to be quickly
>> + registered (i.e. made available for remote access) and de-registered
>> + by submitting WR on the SQ. These capabilities provide a mechanism
>> + to reduce the exposure discused above by limiting the scope of the
>> + exploit. The idea is to create an RKEY that only maps the single RPC
>> + and whose effective lifetime is only the exchange of this single
>> + RPC. This is the default memory model that is employed by the server
>> + when supported by the adapter and by the client when the
>> + rdma_memreg_strategy is set to 6. Note that the client and server
>> + may use different memory registration strategies, however,
>> + performance is better when both the client and server use the
>> + FastReg memory registration strategy.
>> +
>> + This approach has two benefits, a) it restricts the domain of the
>> + exploit to the memory of a single RPC, and b) it limits the duration
>> + of the exploit to the time it takes to satisfy the RDMA_READ.
>> +
>> + It is arguable that a one-shot STag/RKEY is no less secure than RPC
>> + on the TCP transport. Consider that the exact same byzantine
>> + application could more easily corrupt TCP RPC payload by simply
>> + forging a packet with the correct TCP sequence number -- in fact
>> + it's easier than the RDMA exploit because the RDMA exploit requires
>> + that you correctly forge both the TCP packet and the RDMA
>> + payload. In addition the duration of the TCP exploit is the lifetime
>> + of the connection, not the lifetime of a single WR/RPC data transfer.
>> +
>> + So if you buy the argument above, RDMA on IB or iWARP using Fast Reg
>> + is no less secure than TCP.
>
> I'd leave out the first seven words of that last sentence on the grounds
> that it's implicit....
Agreed.
>
> This explanation is helpful, thanks. It would also be helpful if we
> could boil down the advice to just a sentence or two for the busy admin.
> Something like: unless you have card XYZ and kernel 2.6.y, do *not* use
> rdma on a network where you cannot trust every machine....
Would it be better to say, "Do not use RDMA on a network where your
policy requires a security model stronger than tcp/auth_unix."
>
> And better at some point might be to allow nfs-utils to automatically
> check for that situation, and/or just to drop support for anything that
> can't provide at least a tcp/auth_unix-like security model.
>
> --b.
> --
> To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
next prev parent reply other threads:[~2008-09-25 13:35 UTC|newest]
Thread overview: 28+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <1221564879-85046-1-git-send-email-tom@opengridcomputing.com>
[not found] ` <1221564879-85046-2-git-send-email-tom@opengridcomputing.com>
2008-09-24 19:11 ` [PATCH 01/10] svcrdma: Add Fast Reg MR Data Types J. Bruce Fields
2008-09-25 14:27 ` Tom Tucker
[not found] ` <1221564879-85046-3-git-send-email-tom@opengridcomputing.com>
2008-09-24 19:45 ` [PATCH 02/10] svcrdma: Add FRMR get/put services J. Bruce Fields
2008-09-25 14:25 ` Tom Tucker
2008-09-25 14:44 ` J. Bruce Fields
2008-09-25 20:31 ` Tom Tucker
[not found] ` <1221564879-85046-4-git-send-email-tom@opengridcomputing.com>
2008-09-24 20:10 ` [PATCH 03/10] svcrdma: Query device for Fast Reg support during connection setup J. Bruce Fields
2008-09-25 14:08 ` Tom Tucker
[not found] ` <1221564879-85046-5-git-send-email-tom@opengridcomputing.com>
2008-09-24 20:25 ` [PATCH 04/10] svcrdma: Add a service to register a Fast Reg MR with the device J. Bruce Fields
2008-09-25 13:31 ` Tom Tucker
[not found] ` <1221564879-85046-6-git-send-email-tom@opengridcomputing.com>
2008-09-24 20:31 ` [PATCH 05/10] svcrdma: Modify post recv path to use local dma key J. Bruce Fields
2008-09-25 13:36 ` Tom Tucker
[not found] ` <1221564879-85046-7-git-send-email-tom@opengridcomputing.com>
[not found] ` <1221564879-85046-8-git-send-email-tom@opengridcomputing.com>
[not found] ` <1221564879-85046-9-git-send-email-tom@opengridcomputing.com>
[not found] ` <1221564879-85046-10-git-send-email-tom@opengridcomputing.com>
[not found] ` <1221564879-85046-11-git-send-email-tom@opengridcomputing.com>
2008-09-24 21:21 ` [PATCH 10/10] svcrdma: Documentation update for the FastReg memory model J. Bruce Fields
2008-09-25 13:35 ` Tom Tucker [this message]
2008-09-26 16:01 ` Talpey, Thomas
[not found] ` <RTPCLUEXC2-PRDGryWt0000003c-rtwIt2gI0FxT+ZUat5FNkAK/GNPrWCqfQQ4Iyu8u01E@public.gmane.org>
2008-09-30 2:59 ` Tom Tucker
2008-09-26 23:40 ` J. Bruce Fields
2008-09-30 3:07 ` Tom Tucker
2008-09-30 18:44 ` J. Bruce Fields
2008-09-30 18:55 ` Tom Tucker
2008-09-30 18:57 ` J. Bruce Fields
2008-09-30 20:17 ` Tom Tucker
2008-10-01 16:17 ` J. Bruce Fields
2008-10-02 0:38 ` Tom Tucker
2008-09-30 19:04 ` Talpey, Thomas
[not found] ` <RTPCLUEXC2-PRDgFrYI00000094-rtwIt2gI0FxT+ZUat5FNkAK/GNPrWCqfQQ4Iyu8u01E@public.gmane.org>
2008-10-01 18:26 ` J. Bruce Fields
2008-10-01 19:18 ` Talpey, Thomas
[not found] ` <RTPCLUEXC2-PRDVjCRG000000bb-rtwIt2gI0FxT+ZUat5FNkAK/GNPrWCqfQQ4Iyu8u01E@public.gmane.org>
2008-10-01 19:23 ` Talpey, Thomas
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=48DB939E.4090503@opengridcomputing.com \
--to=tom@opengridcomputing.com \
--cc=bfields@fieldses.org \
--cc=linux-nfs@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox