All of lore.kernel.org
 help / color / mirror / Atom feed
From: Walker, Benjamin <benjamin.walker at intel.com>
To: spdk@lists.01.org
Subject: Re: [SPDK] Access control on the subsystem NQN
Date: Tue, 08 Jan 2019 15:06:29 +0000	[thread overview]
Message-ID: <37B08312E007AE46A00101F43DA919DDE5345EED@FMSMSX105.amr.corp.intel.com> (raw)
In-Reply-To: EA913ED399BBA34AA4EAC2EDC24CDD009C25189C@FMSMSX105.amr.corp.intel.com

[-- Attachment #1: Type: text/plain, Size: 3578 bytes --]



> -----Original Message-----
> From: SPDK [mailto:spdk-bounces(a)lists.01.org] On Behalf Of Howell, Seth
> Sent: Monday, January 7, 2019 6:36 PM
> To: Storage Performance Development Kit <spdk(a)lists.01.org>
> Cc: Eyal Shnitzer <eyal.shnitzer(a)kaminario.com>
> Subject: Re: [SPDK] Access control on the subsystem NQN
> 
> Hi Shahar,
> 
> These are great questions!
> 
> The first one I am just answering intuitively, I think that if a host is removed from
> from the subsystem whitelist, all of its connections should be dropped. I can't
> think of an instance where we would want an unauthorized host to maintain
> access to storage resources for an arbitrary amount of time.
> 
> In regards to the second question, I found the following from the spec:
> "NVMe over Fabrics defines a discovery mechanism that a host uses to
> determine the NVM subsystems that expose namespaces that the host may
> access. The discovery Service provides a host with the following capabilities:
> The ability to discover a list of NVM subsystems with namespaces that are
> accessible to the host; . . . "
> This quote makes it sound to me that if a host is not allowed to access a
> namespace, that namespace should not be returned to that host when it makes
> a discovery request.
> I will defer to Ben if he wants to shoot me down on this, but I think that if you
> want to close all of the connections between a subsystem and a host is removed
> from its ACL, and change the way the discovery service works.

I concur. These are both bugs - the connections should drop and the subsystem should not show up
in the discovery log if the host does not have access/loses access to the subsystem.

> 
> Something to think about is that we are planning to add (NVMe in-band)
> authentication support in 19.04. I am in the early stages of investigating this, but
> it seems that authentication and the subsystem host access lists are
> complimentary and the implementation of one should not directly affect the
> other. Theoretically could use any combination of providing whitelists of hosts
> to each subsystem, and allowing any host to connect to a subsystem but
> requiring authentication before submitting any I/O or admin requests.
> 
> Thanks,
> 
> Seth
> 
> 
> 
> 
> -----Original Message-----
> From: SPDK [mailto:spdk-bounces(a)lists.01.org] On Behalf Of Shahar Salzman
> Sent: Monday, December 31, 2018 8:14 AM
> To: Storage Performance Development Kit <spdk(a)lists.01.org>
> Cc: Eyal Shnitzer <eyal.shnitzer(a)kaminario.com>
> Subject: [SPDK] Access control on the subsystem NQN
> 
> Hi,
> 
> On a previous thread, I got the great answer that a subsystem is actually an
> access control list.
> We have been using it as such, but some of the behavior seems odd.
> 
> On host_remove the sessions to the hosts are not disconnected, this means that
> even though I removed the host from the ACL, it will have access, until it
> disconnects (although it cannot connect another session).
> In addition, a host can see all the subsystems exposed on the IP, even though it
> has access to only some of them.
> 
> We would be happy to work on these issues, but I would like to understand the
> expected behavior.
> 
> Thanks,
> Shahar
> _______________________________________________
> SPDK mailing list
> SPDK(a)lists.01.org
> https://lists.01.org/mailman/listinfo/spdk
> _______________________________________________
> SPDK mailing list
> SPDK(a)lists.01.org
> https://lists.01.org/mailman/listinfo/spdk

             reply	other threads:[~2019-01-08 15:06 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-01-08 15:06 Walker, Benjamin [this message]
  -- strict thread matches above, loose matches on Subject: below --
2019-01-15  9:07 [SPDK] Access control on the subsystem NQN Shahar Salzman
2019-01-10  7:56 Walker, Benjamin
2019-01-09 14:45 Shahar Salzman
2019-01-07 17:36 Howell, Seth
2018-12-31 15:14 Shahar Salzman

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=37B08312E007AE46A00101F43DA919DDE5345EED@FMSMSX105.amr.corp.intel.com \
    --to=spdk@lists.01.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.