Return-Path: Received: from mail-gw0-f46.google.com ([74.125.83.46]:49507 "EHLO mail-gw0-f46.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756216Ab0LBX2x convert rfc822-to-8bit (ORCPT ); Thu, 2 Dec 2010 18:28:53 -0500 Received: by gwj20 with SMTP id 20so4468918gwj.19 for ; Thu, 02 Dec 2010 15:28:52 -0800 (PST) From: "Spencer Shepler" To: "'Trond Myklebust'" , "'Thomas Haynes'" Cc: "'J. Bruce Fields'" , "'Spelic'" , References: <4CF3F326.4060608@shiftmail.org> <20101129190122.GA31843@fieldses.org> <1291057747.12784.38.camel@heimdal.trondhjem.org> <4CF519F2.8080900@RedHat.com> <1291155578.2998.38.camel@heimdal.trondhjem.org> <20101130222651.GB5054@fieldses.org> <1291156414.4393.2.camel@heimdal.trondhjem.org> <20101130223627.GC5054@fieldses.org> <20101201135740.0d3b5948@notabene.brown> <1291173002.7694.7.camel@heimdal.trondhjem.org> <20101201162912.GC6832@fieldses.org> <99BBEF51-7EB1-4BAA-9B12-F0F98A629C74@netapp.com> <1291331885.2915.1.camel@heimdal.trondhjem.org> In-Reply-To: <1291331885.2915.1.camel@heimdal.trondhjem.org> Subject: RE: NFSv4 behaviour on unknown users Date: Thu, 2 Dec 2010 15:28:48 -0800 Message-ID: <03e401cb9278$ad554ad0$07ffe070$@gmail.com> Content-Type: text/plain; charset="utf-8" Sender: linux-nfs-owner@vger.kernel.org List-ID: MIME-Version: 1.0 > -----Original Message----- > From: linux-nfs-owner@vger.kernel.org [mailto:linux-nfs- > owner@vger.kernel.org] On Behalf Of Trond Myklebust > Sent: Thursday, December 02, 2010 3:18 PM > To: Thomas Haynes > Cc: J. Bruce Fields; Spelic; linux-nfs@vger.kernel.org > Subject: Re: NFSv4 behaviour on unknown users > > On Thu, 2010-12-02 at 17:10 -0600, Thomas Haynes wrote: > > On Dec 1, 2010, at 10:29 AM, J. Bruce Fields wrote: > > > > > On Tue, Nov 30, 2010 at 10:10:02PM -0500, Trond Myklebust wrote: > > >> > > >> I think you need to take beepy's words in context here: as I > > >> believe I mentioned previously, RFC3530 (and its predecessor > > >> RFC3010) assumed everyone would be using principals for > > >> authenticating, either through RPCSEC_GSS w/ krb5, or through the > > >> SPKM/Lipkey mechanism. So sure was everyone of this, that AUTH_SYS > > >> isn't even mentioned as a valid authentication mechanism, and so > > >> nobody had to worry about the consequences of using it. > > > > > > I also wonder whether the value of a transparent upgrade from NFSv3 > > > got a little lost. > > > > > > To me that seems like the first requirement for version n+1 of > > > anything--that we should be able to upgrade people to version n > > > without their noticing. > > > > > > Maybe there are features that are necessarily incompatible, and that > > > merit the downside, but the downside--losing the chance to get new > > > features to every user automatically--seems significant to me. > > > > > > > > > And, perhaps it's a disease, but I have gotten into the habit of > > > thinking of the (krb5 principal)->(id, gid's) mapping as independent > > > of the (NFSv4 user name)<->(uid) and (NFSv4 group name)<->(gid) > mappings. > > > > > > Granted they have to be coordinated on any reasonably complicated > setup. > > > But there are simple cases where they don't necessarily need to be. > > > > > > E.g. on a dumb "cp -ax / /nfs" backup it doesn't really matter "who" > > > does the backup as long as they have sufficient permissions, since > > > the files will all be explicitly chown'd as they're created. And > > > with krb5 it's simple enough to make that work with a single static > > > mapping from a client-side principal to root on the server. > > > > > > And, again, that's something that works now with NFSv3. > > > > > > --b. > > > -- > > > To unsubscribe from this list: send the line "unsubscribe linux-nfs" > > > in the body of a message to majordomo@vger.kernel.org More majordomo > > > info at http://vger.kernel.org/majordomo-info.html > > > > > > Another question is whether or not such an approach would be > > appreciated as part of 3530bis? > > You want to add a discussion about AUTH_SYS support for 3530bis? I'd be OK > with that... What would the substance of such a discussion? The NFSv4 RFCs do not preclude the use of a variety of RPC authentication types. It asks that implementations treat the RPCSEC_GSS framework and the Kerberos and lipkey types as mandatory to implement. Given that the user of NFSv4 is not forced to use these or other authentication methods, does the discussion reside in the interaction with these various authentication types and their impact on the content of communicated attributes? In any case, I would suggest a treatment of these issues be captured in a separate I-D and ultimately a separate RFC to allow for expediency of publication and application to NFSv4.0 and NFSv4.1. Spencer