Henning,

I wouldn't say that there's anything wrong with the OpenBSD NFSv3
implementation, as the problems with NFSv3 are largely with the specification
(and/or the proliferation of specifications and protocols to deal with what's
not in the 1995 original). I'd anticipate a response not unlike evaluating
IPv4 vs. IPv6: granted the original is flawed, the fact that the successor
protocol is *supposed* to solve the problems of its predecessor doesn't mean
that it does as comprehensively or as well as hoped or that it doesn't have
problems of its own.

If I were looking for an objection to the OpenBSD implementation, I'd probably
follow the analogy between IPv4/IPv6 and NFSv3/NFSv4. Whereas OpenBSD
implements features like IPSec that are optional in IPv4 but mandatory in the
successor, the approach taken to the extensions in NFSv3 that were
subsequently made part of the core v4 spec seem to be displaced to transport-
rather than application-level measures (e.g. use IPSec rather than Kerberos
RPCSEC_GSS or RPCSEC_GSSv2, retaining system- rather than principal-based
authentication). Insofar as being stuck with NFSv3 means being stuck with
NFSv3 plus extensions or other supplements, I know that the interoperability
story across platforms is going to have some sad chapters.

Again, I'm not arguing that NFSv4 is or isn't a cure worse than the disease,
but I'm just as interested in what analysis may be available to argue that
conclusion if that's where the consensus is. I believe something similar was
done around IPv6 that helped feed back to changes in the protocol
specification.

I also suspect that consensus may have moved or divided around this. Looking
at a source like Secure Architectures with OpenBSD (admittedly written when
NFSv4 was rather over the horizon), I find that the relatively brief
concluding section on NFS security contends that, "NFSv4 offers significantly
more security via GSS API and Kerberos". To the extent that people may have
moved on from that view, it would be helpful if the reasoning were documented
and available for broader dissemination. Insofar as there may be some
agreement and clarity as to what to deploy instead of NFSv4 that improves on
vanilla NFSv3, I don't think it well-advertised.

Speaking more broadly, I have this general sense that NFSv4 has disappointed
and that adoption has lagged, although more in terms of deployment than
implementation (OpenBSD seems exceptional in this regard, although perhaps not
exceptionally so by its own standards). There seem to be a lot of summary
expressions, but I've not found anything that really argues the case against
it and outlines how to learn to live with something that isn't NFSv4 and the
bomb. In other words: it seems to me that OpenBSD's not implementing NFSv4 may
be a more decisive expression of objections that are elsewhere given more
mumbled expressionI'd just like to see the case laid out and an acceptable
alternative more clearly articulated.

Cheers,
Bayard

On 27 Oct 2010, at 17:54, Henning Brauer wrote:

> * Bayard Bell <buffer.g.overf...@googlemail.com> [2010-10-27 17:19]:
>> Sorry, but it's not entirely clear where the obstacles are. Is this
>> unhappiness with the specification(s)? the code base for NFSv4 that's
>> been rolled into the other BSDs? something else?
>
> personally I haven't looked closely at nfsv4, but what I saw didn't
> please me.
>
> i am not aware of anybody else (from us) looking into it deeply.
>
> what problem do you think nfsv4 solves for you again? what's wrong
> with our nfs implementation?
>
> --
> Henning Brauer, h...@bsws.de, henn...@openbsd.org
> BS Web Services, http://bsws.de
> Full-Service ISP - Secure Hosting, Mail and DNS Services
> Dedicated Servers, Rootservers, Application Hosting

[demime 1.01d removed an attachment of type application/pkcs7-signature which 
had a name of smime.p7s]

Reply via email to