zlacker

[parent] [thread] 6 comments
1. throw0+(OP)[view] [source] 2022-06-21 11:56:10
> This includes in-transit encryption with TLS […]

Will EFS be updated to use the NFS-TLS RFC once it settles down some?

* https://datatracker.ietf.org/doc/html/draft-ietf-nfsv4-rpc-t...

replies(2): >>chasil+pb >>geertj+Lb
2. chasil+pb[view] [source] 2022-06-21 13:17:12
>>throw0+(OP)
It looked like work on this had stopped. Is there still hope that it might become a published RFC?
replies(2): >>throw0+vc >>geertj+Id
3. geertj+Lb[view] [source] 2022-06-21 13:18:57
>>throw0+(OP)
> Will EFS be updated to use the NFS-TLS RFC once it settles down some?

I can't commit on a public forum for obvious reasons but we'll definitely take a serious look at this, especially when the Linux client starts supporting this. We did consult with the authors of that draft RFC earlier and it should be relatively easy for us to adopt this.

replies(1): >>throw0+zc
◧◩
4. throw0+vc[view] [source] [discussion] 2022-06-21 13:23:01
>>chasil+pb
Activity on the NFSv4 mailing list:

* https://mailarchive.ietf.org/arch/browse/nfsv4/

But no recent commits to the draft:

* https://github.com/chucklever/i-d-rpc-tls

replies(1): >>chasil+Qj
◧◩
5. throw0+zc[view] [source] [discussion] 2022-06-21 13:23:13
>>geertj+Lb
Cool.
◧◩
6. geertj+Id[view] [source] [discussion] 2022-06-21 13:30:22
>>chasil+pb
> It looked like work on this had stopped. Is there still hope that it might become a published RFC?

I don't know, I hope it will.

Not to go on too much of a tangent, and at the risk of sounding like my employer's fanboy, but one of the great things about working at AWS (I'm being honest, and yes we are hiring SDEs and PMs) is that we 100% focus on the customer. When our customers told us they needed encryption in transit, we figured out we could simply offer them transport-level TLS independent from the application-level RPC protocol. It may not have been the standards-compliant approach, but our customers have been enjoying fast reliable encryption for over 4 years now [1]. It solves a real problem because customers have compliance requirements.

[1] https://aws.amazon.com/about-aws/whats-new/2018/04/amazon-ef...

◧◩◪
7. chasil+Qj[view] [source] [discussion] 2022-06-21 14:04:49
>>throw0+vc
Thanks for the mailing list link.

Here is the status:

"This one had to be paused for a bit to work out some issues around using a wider type to hold the epoch value, to accomodate some DTLS-SCTP use cases involving associations expected to remain up for years at a time. https://github.com/tlswg/dtls13-spec/issues/249 ends up covering most of the topics, though the discussion is a bit jumbled. We have a proposed solution with almost all the signoffs needed, and should be attempting to confirm this approach at the session at IETF 112 next week...

"I'm sorry that these have been taking so long; these delays were unexpected."

[go to top]