Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp6228506rwd; Wed, 24 May 2023 12:39:56 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5KG/KDRw2VFTJgQwUAJsCMpo9nGfy2nvAcGrrQk75ZBMacmKKrPAfnJ1vVLi+qwtwcATax X-Received: by 2002:a05:6a00:812:b0:649:450f:3231 with SMTP id m18-20020a056a00081200b00649450f3231mr5183814pfk.9.1684957196418; Wed, 24 May 2023 12:39:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1684957196; cv=none; d=google.com; s=arc-20160816; b=d9M09SV3eZL36VBZEYa5Ust+x4DSngxYSVYEmRLCWmZJ80xWRshOdKyw+13wlj/WnY nEe1uAQ7ZWMfd3UHkqDobjzvbyMKf+ELfuHcaskDc0XvegHt65v2LiXurYmndEgIt7n+ 5KH1WuQ9S89jQqGvqUx1CkKIZyXokyC9pBTpuyF1zc7dEEufYgM6qUoMyDWqCrAiBY8L L/RL3P1a4QwhArnyQX4GQpEAb7hAObZW4/VtyR0qRin0iERY8R4Avv41Vo+9CXh9aMjU d0uDEy5pBNTTd15W+zOoH2uj0LYwKKe7sMYy0y3h4+8kThzqXXl9D8RwPk5Ccdgk5SCP tfzA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent :content-transfer-encoding:references:in-reply-to:date:cc:to:from :subject:message-id:dkim-signature; bh=XpWIiqfk0eeuVghGZD/ZEiqa5oiPhquz0UiHXa+02ME=; b=Sc9bjVtRfg/H+52VN7ka1AFRzNZU7G5l1qWiH75PN2xnCsmglZ5LD066xSh43Iyex4 gc8blLPLOZi7eN6v5AvultPCgKmy9Z7FE8o8EmVnvai57RNyesns07zNCOJCYDmglzs8 UMHNZYFTiPzqe5z0m9mgvr5rHQ3xYHquDe+uUcJSdeUknKVDJ2EBuxtl08iBnL8baR1t 7rUwXvSYIOZpeaFaJ8AXDOdRklKATwf3aMdJBGUMU7hybymf098r2fKx6+gXQrr4YvTN DDrBSn0N3aPS8WVEFQgR+YlO5x7ZTIl14TmJMXiXXfgfjlQ2HQ3xu8b+iilFqLwp+lOj LuXA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=fSnUJB95; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i128-20020a636d86000000b0052c9e4521a1si3985841pgc.673.2023.05.24.12.39.33; Wed, 24 May 2023 12:39:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=fSnUJB95; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232179AbjEXTan (ORCPT + 99 others); Wed, 24 May 2023 15:30:43 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48678 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229547AbjEXTan (ORCPT ); Wed, 24 May 2023 15:30:43 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7F792A4 for ; Wed, 24 May 2023 12:30:42 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 0AFE26359F for ; Wed, 24 May 2023 19:30:42 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id C654DC433D2; Wed, 24 May 2023 19:30:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1684956641; bh=bIiS9hFme942pu5OXr26AmS5sLaYk5kvKswfy+P7qmc=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=fSnUJB95dUbbB2l0AJFq+ITUXm1pHINf8cYQvuBfg4BhU86BiYXJLsxS5esV1CsAl CbI1rpvzWGB1/jRN4GHYd+Y9sfSIQn3ZB2Vj6nKbsvh4HES0PBiey8K5RZyRpScx1w mO50OfSogr1iWAGQ6cT26+Wn6mHUHrFC+UIn3LINjfTl+JjjPUnub+8J02Qy+SEyLJ UZOpYwWKjeMakeED2jRD+2YJUhdNYqvYEDp0jnVicDihupRBBpLc8B0ZypbM1C8Nn0 32OGdq8b2OCI7dR9cmnbqBy2yKRohlUFj2IXG73XXWJXT7S/eQqGtOHS3K2pdh1NtC z9IJ2KD9YaY2A== Message-ID: <4dafe5e56ac269bad9fc45dfee2f2bdcada0876d.camel@kernel.org> Subject: Re: [PATCH v2 00/11] client-side RPC-with-TLS From: Jeff Layton To: Chuck Lever , anna.schumaker@netapp.com, trondmy@hammerspace.com Cc: Chuck Lever , linux-nfs@vger.kernel.org, kernel-tls-handshake@lists.linux.dev Date: Wed, 24 May 2023 15:30:39 -0400 In-Reply-To: <168485183242.6613.7025123558596119858.stgit@oracle-102.nfsv4bat.org> References: <168485183242.6613.7025123558596119858.stgit@oracle-102.nfsv4bat.org> Content-Type: text/plain; charset="ISO-8859-15" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.48.1 (3.48.1-1.fc38) MIME-Version: 1.0 X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Tue, 2023-05-23 at 10:29 -0400, Chuck Lever wrote: > Let's have a look at what is needed to support NFS in-transit > confidentiality in the Linux NFS client. These apply to net-next > but previously they've been tested at multiple NFS bake-a-thon > events. >=20 Why net-next? Aren't the necessary non-NFS/RPC bits now in mainline at this point? What's missing? > This series is also available in the topic-rpc-with-tls-upcall > branch at >=20 > https://git.kernel.org/pub/scm/linux/kernel/git/cel/linux.git >=20 > Changes since RFC: > - Add an rpc_authops method to send TLS probes >=20 > --- >=20 > Chuck Lever (11): > NFS: Improvements for fs_context-related tracepoints > SUNRPC: Plumb an API for setting transport layer security > SUNRPC: Trace the rpc_create_args > SUNRPC: Add RPC client support for the RPC_AUTH_TLS auth flavor > SUNRPC: Ignore data_ready callbacks during TLS handshakes > SUNRPC: Capture CMSG metadata on client-side receive > SUNRPC: Add a connect worker function for TLS > SUNRPC: Add RPC-with-TLS support to xprtsock.c > SUNRPC: Add RPC-with-TLS tracepoints > NFS: Have struct nfs_client carry a TLS policy field > NFS: Add an "xprtsec=3D" NFS mount option >=20 >=20 > fs/nfs/client.c | 7 + > fs/nfs/fs_context.c | 55 +++++ > fs/nfs/internal.h | 2 + > fs/nfs/nfs3client.c | 1 + > fs/nfs/nfs4client.c | 18 +- > fs/nfs/super.c | 12 ++ > include/linux/nfs_fs_sb.h | 3 +- > include/linux/sunrpc/auth.h | 2 + > include/linux/sunrpc/clnt.h | 2 + > include/linux/sunrpc/xprt.h | 17 ++ > include/linux/sunrpc/xprtsock.h | 3 + > include/trace/events/sunrpc.h | 96 ++++++++- > net/sunrpc/Makefile | 2 +- > net/sunrpc/auth.c | 2 +- > net/sunrpc/auth_tls.c | 175 ++++++++++++++++ > net/sunrpc/clnt.c | 9 +- > net/sunrpc/xprtsock.c | 343 +++++++++++++++++++++++++++++++- > 17 files changed, 727 insertions(+), 22 deletions(-) > create mode 100644 net/sunrpc/auth_tls.c >=20 > -- > Chuck Lever >=20 --=20 Jeff Layton