lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1311482486.31450.408.camel@haakon2.linux-iscsi.org>
Date:	Sat, 23 Jul 2011 21:41:26 -0700
From:	"Nicholas A. Bellinger" <nab@...ux-iscsi.org>
To:	James Bottomley <James.Bottomley@...senPartnership.com>
Cc:	Linus Torvalds <torvalds@...ux-foundation.org>,
	target-devel <target-devel@...r.kernel.org>,
	linux-scsi <linux-scsi@...r.kernel.org>,
	linux-kernel <linux-kernel@...r.kernel.org>,
	Christoph Hellwig <hch@....de>,
	Andy Grover <agrover@...hat.com>,
	Hannes Reinecke <hare@...e.de>,
	Roland Dreier <roland@...estorage.com>,
	Andrew Morton <akpm@...ux-foundation.org>
Subject: Re: [PATCH 08/13] iscsi-target: Add CHAP Authentication support
	using libcrypto

On Sun, 2011-07-24 at 07:52 +0400, James Bottomley wrote:
> On Sat, 2011-07-23 at 14:17 -0700, Nicholas A. Bellinger wrote:
> > On Sat, 2011-07-23 at 22:17 +0400, James Bottomley wrote:
> > > On Sat, 2011-07-23 at 10:51 -0700, Linus Torvalds wrote:
> > > > On Sat, Jul 23, 2011 at 9:39 AM, James Bottomley
> > > > <James.Bottomley@...senpartnership.com> wrote:
> > > > >
> > > > > I've asked you twice for input on the patch doing this in userspace,
> > > > > which was posted five weeks ago.  Just ignoring something is
> > > > > unacceptable behaviour ... what do I have to do to get your attention?
> > > > > NAK the patch set?
> > > > 
> > > > So what's the advantage of user space?
> > > > 
> > > > Traditionally, kernel/userspace splits have been:
> > > >  - fragile as hell
> > > >  - more code
> > > >  - slower
> > > >  - complicated to set up
> > > >  - problematic with backwards compatibility issues
> > > > and these days when I see some kernel functionality that needs user
> > > > space support, I just go "f*ck, that's going to be a pain".
> > > > 
> > > > So I think the "that part can be done in user space" argument is
> > > > fundamentally crap.
> > > > 
> > > > Now, if it is an issue of "that can be done BETTER in user space
> > > > BECAUSE xyz", then that's a different issue. I haven't seen that
> > > > argument, though.
> > > 
> > 
> > I think the 'fragile as hell' and 'complicated to set up' ring the most
> > true here.  Thank you Linus..
> 
> The usual source of fragility here is a badly designed or complex ABI.
> So why don't you actually respond to the patch (as you've been asked to
> over the last five weeks) and point out what the problem is with its
> user to kernel ABI rather than blindly asserting something for which you
> have no evidence.
> 

Because the patch does not do what I originally said I would accept as a
userspace passthrough.  It's that simple.


> > > Well, this is essentially the argument.  The iSCSI authentication code
> > > follows a standard which originally had 4 different authentication
> > > methods (of which CHAP is just one) but which is now up to about 8 I
> > > think and rising.  It would be a massive amount of code to put them all
> > > in kernel, plus the authentication isn't a fast path thing; it's done
> > > once at login.  We already have the code to do this (although from the
> > > client side, not the server side) in userspace in the initiator.
> > > 
> > 
> > This is an incorrect statement.  I was very specific in May what type of
> > authentication passthrough that I want for iscsi-target, and why moving
> > the entire login path to userspace is a really bad idea for a
> > kernel-level iscsi-target that has a configfs control plane supporting
> > fully dynamic configuration.  So while I very much apprectiate the
> > efforts by Tomo directed by yourself, this is *not* what I asked for,
> > and is not acceptable for LIO iscsi-target code for the default login
> > codepath.
> 
> Look, it's this simple.  If we accept the principle that authentication
> should be done in-kernel for simplicity and ease of management, then it
> should all be done there.  If, as you seem to be suggesting, some
> authentication models are so complex they should be done in userspace,
> then it should all be done there.  Having two separate paths, one
> through kernel and one through user space for the same operation is the
> real recipe for fragility because it doubles the amount of testing and
> generally means that one path is less well tested than the other.
> 

Again, this is a simplified view of something that is not 'black or
white' in the actual implementation.  Passing the 'optional to
implement' authentication payloads into userspace is hardly a 'recipe
for fragility', considering that:

- We don't have a single client at this point that actually is going to
need this for v3.1

- The previous iscsi-target code actually implemented things this way
for the authentication path

> > So restate what I want:  A passthrough for pushing 'optional to
> > implement' iSCSI authentication payloads to userspace (like we had in
> > LIO v2.x) that can be enabled optionally on a per iSCSI target endpoint
> > context, and does not touch the default login path.  The specific code
> > reasons for this have not changed at all in the last months, and can be
> > found here for reference:
> > 
> > http://marc.info/?l=linux-kernel&m=130661363200680&w=2
> > 
> > > The prototype implementation, is very clean: it does the authenticated
> > > login and then passes the connected socket to the kernel for operations,
> > > so there's no real fragile state to pass across.
> > > 
> > 
> > I completely disagree. 
> 
> Based on what, since you don't yet appear to have read the patch?
> 

Yes I have read the patch, and no, I am not going to merge it into the
LIO upstream tree or commit to supporting it's model in iscsi-target as
the default.  It's wrong for the default paths, and gives us no upside
benefit for the SW target.

> > > There are a couple of reasons why user space makes sense apart from the
> > > existing code and the clean separation of setup from operation: some of
> > > the auth methods involve complex algorithms and debugging them in
> > > userspace is just easier, plus it allows easy backward compatible
> > > addition of new authentication mechanisms without having to respin a
> > > kernel.
> > > 
> > 
> > Again, the 'optional to implement' authentication methods are what needs
> > to goto userspace in seperate authentication specific daemons, and not
> > the entire login control path into a single userspace process for even
> > the 'authentication disabled' case.  This is the wrong split.
> > 
> > Also, the patch did not address any form of backwards compatability
> > because it did not provide any patches for rtslib to expose the new
> > functionality to application level devels and distros who are already
> > integrating this package.
> 
> What backwards compatibility?  iscsi target is a new feature for the
> kernel.  The users of the out of tree code can surely continue to use it
> and it's hardly an impossible task to migrate them.
> 

Please understand that we have a complete iscsi-target userspace library
using native python object code in userspace that drives configuration
of /sys/kernel/config/target/iscsi control plane.  It's nice to just
gloss over the fact, and go back to punting this part back into
userspace and use a seperate configuration files that iscsi-login daemon
is required to parse, and be aware of state changes etc.

This is where the real API fragililty comes into play from the
perspective of application devels using this code.  Avoiding this for
the default paths is very important from their perspective for a
consistent API, and for backward compatability if and when the configfs
control path needs to change.

> > As mentioned before, we (LIO and RTS) have no interest in breaking a
> > python object library that already exposes iscsi-target functionality
> > users actually want, for a last-minute split that makes the overall
> > design less effective for the default cases the vast majority of people
> > actually care about.
> > 
> > > Quite a few other authentication mechanisms (like wireless and ipsec)
> > > are in userspace for the setup and negotiation and in-kernel for the
> > > operation, so it's a well understood paradigm.
> > > 
> > 
> > And, we have also seen historically how painful the split has been with
> > open-iscsi, which in the end took much longer to get stable (and is
> > still harder to debug) than if a proper login split was used to begin
> > with.
> > 
> > I have been very willing to compromise on many things throughout this
> > target mode endevour, but making it more difficult for iscsi-target to
> > 'just work' is not what the userbase wants, and will not be changing
> > this for the default two cases.
> 
> Mike gave a fair assessment of this, so I'll leave the final word to
> him.
> 

While I apperciate Mike's input here, I'll leave the final word to Andy
and Christoph who have been primarly driving iscsi-target v4.1
development and are the guys who have their fingers deepest in the code.

But all that said, there is still one person who has the real final word
here, and he's made it clear how he feels about this type of kernel/user
split.

--nab

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ