Return-Path: Received: from elasmtp-curtail.atl.sa.earthlink.net ([209.86.89.64]:36386 "EHLO elasmtp-curtail.atl.sa.earthlink.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756872AbbIVSSI convert rfc822-to-8bit (ORCPT ); Tue, 22 Sep 2015 14:18:08 -0400 From: "Frank Filz" To: "'Trond Myklebust'" , "'Chuck Lever'" Cc: "'Linux NFS Mailing List'" References: <1442429367.24127.6.camel@localhost.localdomain> <08D9E2B0-B4A8-4DF0-9BB7-B19B2D260E97@oracle.com> <001a01d0f0c7$ca84e6d0$5f8eb470$@mindspring.com> <3E2CC450-BB4D-4F08-957D-EB78FE3665BE@oracle.com> <74D754DA-7B3E-4753-8619-87909B3AE40A@oracle.com> In-Reply-To: Subject: RE: [PATCH] Use a separate superblock if mount requires a different security flavor Date: Tue, 22 Sep 2015 11:17:50 -0700 Message-ID: <015d01d0f562$fe9fccb0$fbdf6610$@mindspring.com> MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Sender: linux-nfs-owner@vger.kernel.org List-ID: From: Trond Myklebust [mailto:trond.myklebust@primarydata.com] > Sent: Tuesday, September 22, 2015 6:00 AM > To: Chuck Lever > Cc: Frank Filz ; Linux NFS Mailing List nfs@vger.kernel.org> > Subject: Re: [PATCH] Use a separate superblock if mount requires a different > security flavor > > On Mon, Sep 21, 2015 at 9:31 PM, Chuck Lever > wrote: > > > >> On Sep 21, 2015, at 5:43 PM, Trond Myklebust > wrote: > >> > >> On Mon, Sep 21, 2015 at 7:10 PM, Chuck Lever > wrote: > >>> > >>>> On Sep 17, 2015, at 11:01 AM, Chuck Lever > wrote: > >>>> > >>>> > >>>> On Sep 16, 2015, at 11:32 PM, Trond Myklebust > wrote: > >>>> > >>>>> On Wed, Sep 16, 2015 at 5:36 PM, Frank Filz > wrote: > >>>>>>> On Wed, Sep 16, 2015 at 4:55 PM, Chuck Lever > >>>>>>> > >>>>>>> wrote: > >>>>>>>> > >>>>>>>> On Sep 16, 2015, at 4:52 PM, Trond Myklebust > >>>>>>> wrote: > >>>>>>>> > >>>>>>>>> On Wed, Sep 16, 2015 at 2:49 PM, Frank Filz > >>>>>>>>> > >>>>>>> wrote: > >>>>>>>>>> If a server has two exports from the same filesystem but with > >>>>>>>>>> different security flavors allowed, when the client mounts > >>>>>>>>>> first one and then the second, the same super block was being > >>>>>>>>>> used. This resulted in the security flavor for the first > >>>>>>>>>> export being applied to access to the second export. > >>>>>>>>>> > >>>>>>>>>> The fix is simply to check the security flavor of the > >>>>>>>>>> nfs_server temporarily constructed for the second mount > >>>>>>>>>> within > >>>>>>> nfs_compare_super. > >>>>>>>>>> > >>>>>>>>>> Signed-off-by: Frank S. Filz > >>>>>>>>>> --- > >>>>>>>>>> fs/nfs/super.c | 3 +++ > >>>>>>>>>> 1 file changed, 3 insertions(+) > >>>>>>>>>> > >>>>>>>>>> diff --git a/fs/nfs/super.c b/fs/nfs/super.c index > >>>>>>>>>> 084af10..44d60f1 > >>>>>>>>>> 100644 > >>>>>>>>>> --- a/fs/nfs/super.c > >>>>>>>>>> +++ b/fs/nfs/super.c > >>>>>>>>>> @@ -2455,6 +2455,9 @@ static int nfs_compare_super(struct > >>>>>>>>>> super_block *sb, void *data) > >>>>>>>>>> struct nfs_server *server = sb_mntdata->server, *old = > >>>>>>>>>> NFS_SB(sb); > >>>>>>>>>> int mntflags = sb_mntdata->mntflags; > >>>>>>>>>> > >>>>>>>>>> + if(old->client->cl_auth->au_flavor > >>>>>>>>>> + != server->client->cl_auth->au_flavor) > >>>>>>>>>> + return 0; > >>>>>>>>> > >>>>>>>>> Isn't this check already being performed in > >>>>>>>>> nfs_compare_mount_options()? As far as I can see, the > >>>>>>>>> difference is that you are checking unconditionally, whereas > >>>>>>>>> nfs_compare_mount_options only does so if there was a 'sec=' > >>>>>>>>> line specified in the mount options. > >>>>>>>> > >>>>>>>> Right. If the user doesn't provide a sec=, the security flavor > >>>>>>>> is autonegotiated. In the case Frank describes, there are two > >>>>>>>> directories shared on the server, each from the same FSID but > >>>>>>>> using distinct security policies. > >>>>>>>> > >>>>>>>> So the mount options comparison is inadequate if no sec= is > >>>>>>>> specified on the mount command line. > >>>>>>> > >>>>>>> We don't claim to support autonegotiation of multiple security > >>>>>>> policies per filesystem, in general. We only claim to support > >>>>>>> one auth flavour per super block. > >>>>>>> > >>>>>>> If I understand you correctly, you are knowingly trying to work > >>>>>>> around that limitation by performing multiple mounts of the same > >>>>>>> filesystem and force it to use multiple super blocks. Why can't you > then also specify the 'sec='? > >>>>>> > >>>>>> I see that point, but why not just make this case work smoothly > rather than force the user to go back and specify -o sec on the mount? > >>>>> > >>>>> The main issue is that it violates the policy that we must try our > >>>>> best not to set up situations where the client has cache > >>>>> consistency issues due to the existence of multiple superblocks > >>>>> that all have page caches for the same file. > >>>> > >>>> The parts of the physical FS's namespace that are accessible by > >>>> each security flavor are disjoint. Aside from hardlinks, is there > >>>> any possibility for cache aliasing in this scenario? > >>>> > >>>> > >>>>>> Actually all that is necessary is SOME difference in mount options (or > use -o nosharedcache, which could be used on all the mounts so all can have > the same mount options...) and allow security negotiation to work. > >>>>> > >>>>> I'd expect there to be no problems if the admin specifies -o > >>>>> nosharedcache. Please do let me know if that fails to work. > >>>>> > >>>>>> An interesting question is if there are any servers out there that > don't typically provide different FSID for different portions of the > namespace, but also provide a mechanism to specify different security > policies for different portions of the namespace? > >>>>> > >>>>> That sort of situation is difficult to manage. > >>>> > >>>> But appears to be allowed by Solaris, and likely also by Linux and > >>>> Ganesha. I think we are going to have to consider it, particularly > >>>> if there is no prohibition against it in the RFCs. > >>> > >>> It is certainly possible to document best practices or add admin UI > >>> limits to prevent servers from being configured this way. > >>> > >>> Meanwhile, the Linux client does allow mounting such exports when > >>> both mounts specify unique “sec=“. If this is a dangerous or > >>> unsupported scenario, perhaps this should be disallowed somehow. > >>> > >>> When security is negotiated, the second mount is not allowed. It > >>> could display an informative error message when if fails. > >> > >> My main worry with the patch you proposed is that we're only > >> considering a small part of the problem here, namely what happens on > >> mount. > >> What if the user were to mount '/' instead of the particular path you > >> chose, and then simply walk down to the problematic directory? As far > >> as I can see, that will fail just as badly both with and without this > >> patch. Why would users expect that behaviour to be any different to > >> the new mount behaviour? > > > > Maybe that’s a little different, though I don’t have direct > > experience of how this is supposed to work. > > > > If the client mounts “/“ with an explicit security flavor that does > > not work with all the server’s shares, then that’s clearly an admin > > choice. The root directories of inaccessible shares will simply not > > allow users to cd into them. > > > > Right now, I can do > > mkdir -p /mnt; umount -a -t nfs,nfs4; mount server:/ /mnt; cd /mnt/foo/bar > > or I can do > > mkdir -p /mnt/foo/bar; umount -a -t nfs,nfs4; mount server:/foo/mnt > /mnt/foo/bar; cd /mnt/foo/bar > > I can expect both approaches to lead to the exact same behaviour in > directory /mnt/foo/bar. This is true no matter what the path I'm mounting or > looking up, as long as I use the default mount options. > > Any patches need to preserve this property that mount and lookup are the > same operation... I just verified this. I have two exports (of interest): /export/sys /export/none Without the patch, if I mount /export/sys, I can not subsequently mount /export/none. If I mount /, I can ls /mnt/sys, but not /mnt/none (getting the same EPERM error). With the patch, I can mount both /export/sys and /export/none, or I can mount / and ls both /mnt/sys and /mnt/none. Looking at a wireshark trace, in the mount / and then ls the two directories scenario, I see LOOKUP failing with NFS4ERR_WRONGSEC followed by SECINFO followed by a new LOOKUP that succeeds. Note that after the two ls, this is what I see in mount: 192.168.0.110:/ on /mnt type nfs4 (rw,relatime,vers=4.0,rsize=1048576,wsize=1048576,namlen=255,hard,proto=tcp,timeo=600,retrans=2,sec=sys,clientaddr=192.168.0.117,local_lock=none,addr=192.168.0.110) 192.168.0.110:/export/sys on /mnt/export/sys type nfs4 (rw,relatime,vers=4.0,rsize=1048576,wsize=1048576,namlen=255,hard,proto=tcp,port=0,timeo=600,retrans=2,sec=sys,clientaddr=192.168.0.117,local_lock=none,addr=192.168.0.110) 192.168.0.110:/export/none on /mnt/export/none type nfs4 (rw,relatime,vers=4.0,rsize=1048576,wsize=1048576,namlen=255,hard,proto=tcp,port=0,timeo=600,retrans=2,sec=null,clientaddr=192.168.0.117,local_lock=none,addr=192.168.0.110) It looks to me like everything is working as I would have expected. I think it actually speaks to the robustness of the mounting code that all we needed to do was add a check on the security flavor for the "server" to identify that a new superblock was necessary. Frank --- This email has been checked for viruses by Avast antivirus software. https://www.avast.com/antivirus