[AFS3-std] rxgk-afs: moving SetCallBackKey to a separate document?

Matt W. Benjamin matt@linuxbox.com
Fri, 1 Mar 2013 18:43:14 -0500 (EST)


Hi Ben,

If you just wanted RPC security sooner, you could have deployed rxk5 in 2007.
The point of waiting for rxgk was to get compelling features like a secure
callback channel.

It is my impression that the YFS implementation implements callback
channel security today.  I'm not sure quite when the community should make time
to get an -interoperable- secure callback channel, but, isn't it, arguably,
now?

Regards,

Matt

----- "Benjamin Kaduk" <kaduk@MIT.EDU> wrote:

> On Fri, 1 Mar 2013, Russ Allbery wrote:
> 
> > Benjamin Kaduk <kaduk@MIT.EDU> writes:
> >> On Fri, 1 Mar 2013, Jeffrey Altman wrote:
> >
> >>> Extended callbacks cannot be fully implemented until there are
> >>> protected callback channels.  That does not mean there are not
> benefits
> >>> to protecting the callback channels in a world without extended
> >>> callbacks.
> >
> >> I believe the question at hand is whether those benefits are
> sufficient
> >> to delay standardizing rxgk.  Do you have an opinion on this
> question?
> >
> > Personally, I think an rxgk standard that didn't protect the
> callback
> > channel would be absurd.
> 
> While I am happy to hear an opinion expressed, merely saying that 
> something would be "absurd" does not really give me a technical
> argument 
> whose merits I can weigh and consider.  At best, I can weigh the
> position 
> against your personal reputation, which is admittedly quite strong.
> 
> Jeff has described the current situation with regard to callbacks and
> 
> information leakage and denial of service possibility.  Given that
> even 
> with rxgk and a secure callback channel, we still have the problem of
> rx 
> aborts being unauthenticated, I'm looking at a difference between rxgk
> 
> now and rxgk later with secure callbacks.  Rxgk now gives me secure
> data 
> transfer and authentication, but leaves me vulnerable to denial of
> service 
> both at a per-RPC level and a refetching data level, as well as the 
> information leakage about fids and such in use.  Rxgk later also gives
> me 
> secure data transfer and authentication, and leaves me vulnerable to 
> per-RPC denial of service attacks, but closes the data leakage channel
> and 
> closes the denial of service attack that makes me refetch lots of
> data.
> 
> To me, in the environment I work in, network is cheap, and I don't
> really 
> care about this class of information leakage; I'd rather have the
> stronger 
> crypto for authentication and data transfer sooner.  I'm interested in
> 
> hearing why and how the tradeoff leans otherwise in different 
> environments.
> 
> I'm happy to make securing the callback channel be the next thing done
> 
> after rxgk; I think it would give us secure callbacks at about the
> same 
> time as blocking rxgk on secure callbacks, but we would get rxgk
> sooner. 
> I just don't see that rxgk itself has an inherent dependency on
> secure
> callbacks; in my mind, secure callbacks are a thing that use rxgk.
> 
> -Ben
> _______________________________________________
> AFS3-standardization mailing list
> AFS3-standardization@openafs.org
> http://lists.openafs.org/mailman/listinfo/afs3-standardization

-- 
Matt Benjamin
The Linux Box
206 South Fifth Ave. Suite 150
Ann Arbor, MI  48104

http://linuxbox.com

tel.  734-761-4689 
fax.  734-769-8938 
cel.  734-216-5309