SORT BY:

LIST ORDER
THREAD
AUTHOR
SUBJECT


SEARCH

IPS HOME


    [Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

    RE: BOUNCE ips@ece.cmu.edu: Non-member submission from [Brian Pawlowski <beepy@netapp.com>]



    Beepy,
    
    I have been thinking about NFSv4 also, in the context
    of this discussion and I believe the analogy is not
    particularly relevant for a few reasons:
    
    1. The security holes in NFSv2/3 were much more fundamental
       than on-the-wire security - so the real fix in NFSv4 is the
       introduction of better access control through ACLs
       (a la CIFS). On-the-wire security, IMO doesn't add much
       value to NFSv4 in the most typical deployments (I'm very
       curious to see how many people actually use s/w based
       per-packet security in NFSv4 within the data center or
       office environment). To put some perspective, it is much
       more likely that a security breach will happen via hacks
       into servers rather than people spoofing wires inside a
       data center. So robust access control goes a long way here.
    
    2. The main justification for on-the-wire security in NFSv4
       is, IMO, due to the stated goal of NFSv4 to be the file-access
       mechanism for the (big bad) Internet. The equivalent in
       the IPS world would be FCIP. Bob Snively has made some
       excellent points about the pragmatics of deploying security
       in these situations.
    
    3. The per-packet security mechanism in NFSv4 (RPCSEC_GSS)
       implies NFSv4 vendors have to modify their RPC stacks --
       security cannot be "added on" by users if it's not
       implemented in the RPC stack. So it makes sense to
       mandate implementation.
       In the case of IPS, the security mechanism is quite
       amenable to a deployment using an adjunct device
       or a boundary gateway device (subject to acceptable
       resolution of the keying exchange issues).
    
    It's important to understand that the IPSec discussion is 
    different from the access-control aspect of NAS security.
    
    
    Regards,
    Sudhir
    
    > -----Original Message-----
    > From: Jim McKinney [mailto:jmck+@ece.cmu.edu]
    > Sent: Thursday, August 02, 2001 7:27 AM
    > To: ips@ece.cmu.edu
    > Subject: Fwd: BOUNCE ips@ece.cmu.edu: Non-member submission 
    > from [Brian
    > Pawlowski <beepy@netapp.com>] 
    > 
    > 
    > From: Brian Pawlowski <beepy@netapp.com>
    > Message-Id: <200108020447.VAA02871@tooting-fe.eng.netapp.com>
    > Subject: Re: Security Gateways
    > In-Reply-To: <200108020206.f7226He27045@ece.cmu.edu> from Jim 
    > McKinney at "Aug 1, 1 10:06:17 pm"
    > To: jmck+@ece.cmu.edu (Jim McKinney)
    > Date: Wed, 1 Aug 2001 21:47:20 -0700 (PDT)
    > Cc: ips@ece.cmu.edu
    > X-Mailer: ELM [version 2.4ME++ PL40 (25)]
    > MIME-Version: 1.0
    > Content-Type: text/plain; charset=US-ASCII
    > Content-Transfer-Encoding: 7bit
    > 
    > > 2)  Concerning market requirements:
    > > 
    > > A very high percentage of storage environments today manage
    > > their configurations very carefully.  Such careful management is
    > > necessary to guarantee redundant paths for proper availability,
    > > to provide sufficient paths to provide the required 
    > performance, and to
    > > guarantee known paths to improve reparability and consistency
    > > of behavior.  As a side effect, a very high percentage of
    > > the paths of a storage environment are physically secured and have
    > > no requirement for additional security mechanisms.  
    > 
    > I've often mused that storage environments today based on FC are
    > physically secure as an artifact of the severe deployment restrictions
    > that the technology itself supports.
    > 
    > Replacing FC deployments with TCP/IP-based networks blows these
    > assumptions.
    > 
    > After years in the insecure wilderness within NFS, and the inability
    > to count on strong security from all vendors removing a motivation
    > to even invest in it (it was optional), the movement in NFS Version 4
    > to strong security was a key component of the evolution wrought since
    > it was handed to the IETF.
    > 
    > I look back on our lack of commitment to providing interoperable,
    > manadatory to implement (optional to enable) strong security as being
    > one of the greatest failures in NFS - that is finally being corrected.
    > 
    > It is certainly sobering when your PC on your desktop 
    > provides stronger
    > security guarantees in a simple network when it accesses data on some
    > server (CIFS) than you are guaranteed (through mandatory to implement)
    > in your enterprise class storage network. 
    > 
    > beepy
    > 
    > 
    


Home

Last updated: Tue Sep 04 01:04:07 2001
6315 messages in chronological order