[OpenAFS] Re: [OpenAFS-devel] rxgk development has been funded
Tue, 23 Oct 2012 18:56:32 -0400
This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
Content-Type: text/plain; charset=UTF-8
On 10/23/2012 5:48 PM, Benjamin Kaduk wrote:
> Dear all,
> I wanted to give a heads-up that MIT has funded me to work on
> implementing rxgk for OpenAFS. MIT is committed to AFS as part of our
> basic infrastructure, and we recognize that the current DES-based
> security class in OpenAFS is aging rapidly. Implementing the new
> GSSAPI-based rxgk will help us meet our own needs, and also help the
> community at large to modernize their own deployments.
> This is a long-term project, we expect it to take about a year to run t=
> completion. There won't be much to look at or try out in the first
> months, but we will call for testers when we're ready for them.
> The work will of course need to progress through consensus of the
> afs3-standardization group and my first steps will be reviving
> discussion there. (
> http://lists.openafs.org/mailman/listinfo/afs3-standardization )
> Hopefully knowing that there is work in progress will be reassuring to
> many who would otherwise worry about the future of OpenAFS.
> -Ben Kaduk
Those of us with extensive IETF Security Area experience value the
benefit of standards review performed via independent implementation.
Your File System Inc. completed our implementation of rxgk along with
all of the supporting infrastructure more then 18 months ago. All of
the required framework modifications to the OpenAFS UNIX source tree
were pushed upstream to the 'master' branch. What became a blocker for
us contributing the rest of the pieces to OpenAFS was the lack of timely
review. As a result Your File System Inc. determined that the only way
to bring rxgk and all of the other functionality we developed over three
and half years was to create a replacement file system protocol. The
other option was to let the staff go find other jobs and walk away from
MIT's commitment of your development time will be the first new
significant academic contribution to OpenAFS from a U.S. institution in
nearly six years. Your experience with both OpenAFS and Kerberos
development makes you the perfect independent reviewer and implementer.
In 2008 Your File System Inc. committed to releasing features to OpenAFS
from our commercial products one year after initial release. The
rationale for that time frame is to ensure that the investments spent on
developing the technology can be recouped and used to fund the next
round of features and functional improvements.
Last week at the European AFS and Kerberos Conference,
http://openafs2012.inf.ed.ac.uk/programme, Your File System Inc.
announced that version YFS 1.0 would be available for sale to the public
in April 2013. Based upon that time scale our rxgk implementation would
be contributed to OpenAFS in April 2014.
As rxgk is a security protocol, there are significant benefits to having
qualified independent review and also an independent implementation to
demonstrate that the protocol standard is accurate and sound. However,
the AFS3 standardization process does not require it. One choice that
needs to be made given the limited resources is whether or not to
re-implement the work that YFSi has already performed.
As a Gatekeeper, can you speak to what level of functionality and
integration work that MIT is committing to? Producing an OpenAFS 2.0
release that includes "rxgk" will require more than just producing an
"rxgk" security class. One of the necessary dependencies is removing
the last vestiges of LWP from the source tree OR creating a GSS-API
stack that uses LWP.
YFSi has pushed upstream the changes to use pthreaded ubik, the libtool
changes to ensure that mixed pthread and lwp libraries do not end up in
processes, and many other pieces. There is still substantial work that
needs to be finished for OpenAFS. Some pieces YFSi has already
completed internally and others that we have avoided because unlike
OpenAFS 2.0, YFS 1.0 does not need to support all of the existing tools
"rxgk" is a security class but many of the benefits that system
administrators associate with the rxgk implementation are far outside
the security layer. Cache poisoning protection via use of combined
tokens, departmental file services, mandatory security levels,
non-Kerberos authentication, etc. are all features that have become
associated with "rxgk" because without "rxgk" they cannot be
implemented. Can you indicate which functionality MIT is committed to?
Or MIT simply interested in providing the minimum necessary to permit
GSS Kerberos v5 to be used for authentication and AES-256/SHA-1 to used
for wire encryption?
I look forward to seeing how all of this plays out.
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
-----END PGP SIGNATURE-----