Permissions Mapping in the Isilon OneFS File System



Similar documents
Using NFS v4 ACLs with Samba in a multiprotocol environment

EMC ISILON MULTIPROTOCOL DATA ACCESS WITH A UNIFIED SECURITY MODEL

ONEFS MULTIPROTOCOL SECURITY UNTANGLED

This section discusses the protocols available for volumes on Nasuni Filers.

WHITE PAPER. Understanding Windows & UNIX File Permissions on GuardianOS

IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE

Operating Systems File system mounting, sharing, and protection. File System Mounting

USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE

Filesystem Security. General Principles

Windows Security. CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger.

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

TELE 301 Lecture 7: Linux/Unix file

Deploying a File Server Lesson 2

CIS 551 / TCOM 401 Computer and Network Security

CSE543 - Introduction to Computer and Network Security. Module: Reference Monitor

Introduction to Computer Security

Using Samba with a Commercial Clustered File System

Access Control Lists in Linux & Windows

SHARING FILE SYSTEM RESOURCES

A COMPARISON BETWEEN THE SAMBA3 AND LIKEWISE LWIOD FILE SERVERS

System Security Fundamentals

Outline: Operating Systems

CONFIGURATION GUIDELINES: EMC STORAGE FOR PHYSICAL SECURITY

Clustered Data ONTAP 8.2

CIS 551 / TCOM 401 Computer and Network Security. Spring 2005 Lecture 4

Chapter 6, The Operating System Machine Level

CSE331: Introduction to Networks and Security. Lecture 34 Fall 2006

StorHouse/CIFS Installation and Configuration Guide

Allion Ingrasys Europe. NAStorage. Security policy under a UNIX/LINUX environment. Version 2.01

EMC ISILON X-SERIES. Specifications. EMC Isilon X200. EMC Isilon X210. EMC Isilon X410 ARCHITECTURE

Integrating Lustre with User Security Administration. LAD 15 // Chris Gouge // 2015 Sep

EMC ISILON AND ELEMENTAL SERVER

GuardianOS Data Migration Tool Enables Ease of Snap Server Deployment and Data Consolidation WHITE PAPER

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Lesson 14: Configuring File and Folder Access. MOAC : Configuring Windows 8.1

CIS433/533 - Computer and Network Security Operating System Security

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)

Combining Shared Folder and NTFS Permissions

BMC CONTROL-M Agentless Tips & Tricks TECHNICAL WHITE PAPER

AUTOMATED DATA RETENTION WITH EMC ISILON SMARTLOCK

CIFS/NFS Gateway Product Release Notes. Version May 2015 Revision A0

Implementing an advanced access control model on Linux

NAStorage. Administrator Guide. Security Policy Of NAStorage Under UNIX/LINUX Environment

FILE ARCHIVAL USING SYMANTEC ENTERPRISE VAULT WITH EMC ISILON

The Panasas Parallel Storage Cluster. Acknowledgement: Some of the material presented is under copyright by Panasas Inc.

The Mac OS X Server Essentials v10.5 Exam Skills Assessment Guide

Understanding and Using NetInfo. Includes information on setting up Mac OS X Server and NetInfo to increase the power of your Mac OS X network

Three Linux Security Basics

How To Manage File Access On Data Ontap On A Pc Or Mac Or Mac (For A Mac) On A Network (For Mac) With A Network Or Ipad (For An Ipad) On An Ipa (For Pc Or

Creating Home Directories for Windows and Macintosh Computers

New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer

Migrating from NFSv3 to NFSv4. Migrating from NFSv3 to NFSv4. March of STORAGE NETWORKING INDUSTRY ASSOCIATION

Using Mac OS X Clients with Isilon OneFS 7.x. Resources for Integration and Configuration

CIFS and NFS Auditing Guide

Backup and Restore of CONFIGURATION Object on Windows 2008

BUGS! Catch Them Before They Catch You

Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper

File Services. File Services at a Glance

Case Study: Access control 1 / 39

Case Studies. Joint software development Mail 1 / 38. Case Studies Joint Software Development. Mailers

SSL Tunnels. Introduction

Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

1 Posix API vs Windows API

Module 11. Configuring and Managing Distributed File System. Contents:

Chapter 7: Unix Security. Chapter 7: 1

SerNet. Clustered Samba. Nürnberg April 29, Volker Lendecke SerNet Samba Team. Network Service in a Service Network

Capability-Based Access Control

Windows Server 2008 R2 Essentials

Configuring Security for SMTP Traffic

Secure Shell Demon setup under Windows XP / Windows Server 2003

Analyzing Network Servers. Disk Space Utilization Analysis. DiskBoss - Data Management Solution

Lucid Key Server v2 Installation Documentation.

Big Data Management and Security

your Apple warranty; see There are two main failure modes for a mirrored RAID 1 set:

WHITE PAPER. Home Directories on Snap Server GuardianOS

The Real Challenges of Configuration Management

Implementation of Hadoop Distributed File System Protocol on OneFS Tanuj Khurana EMC Isilon Storage Division

Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5

Designing a Cloud Storage System

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

LucidNAS Quick Start Guide

Chapter 12 File Management. Roadmap

Chapter 12 File Management

EMC ISILON HOME DIRECTORY STORAGE SOLUTIONS FOR NFS AND SMB ENVIRONMENTS

4.1 Introduction 4.2 Explain the purpose of an operating system Describe characteristics of modern operating systems Control Hardware Access

Mac OS X Server. File Services Administration For Version 10.4 or Later

Macintosh Printer Management using Centrify DirectControl Group Policies

Introduction to HDFS. Prasanth Kothuri, CERN

Active Directory Compatibility with ExtremeZ-IP

Clustered Data ONTAP 8.3

Adam Retter. Security. in exist-db. Security in exist-db

Isilon OneFS. Version Web Administration Guide

Implementing the Hadoop Distributed File System Protocol on OneFS Jeff Hughes EMC Isilon

EMC ISILON NL-SERIES. Specifications. EMC Isilon NL400. EMC Isilon NL410 ARCHITECTURE

How To Configure the Oracle ZFS Storage Appliance for Quest Authentication for Oracle Solaris

Introduction to Hadoop HDFS and Ecosystems. Slides credits: Cloudera Academic Partners Program & Prof. De Liu, MSBA 6330 Harvesting Big Data

Transcription:

Permissions Mapping in the Isilon OneFS File System NTFS ACLs, NFSv4 ACLs, and POSIX Mode Bits Steven Danneman and Zack Kirsch

Agenda What is OneFS? POSIX, NTFS and NFSv4 Permission Overview Isilon s Permission Implementation Setting Retrieval Enforcement Advanced Permission Implementation Special Identities Inheritance Canonical Order 2

Isilon OneFS Cluster NAS file server Scalable Add more storage in 5 mins Reliable 8x mirror / +4 parity Striped across nodes Single volume file system (5.2 PB) 3 to 144 nodes Fully symmetric peers No metadata servers Commodity hardware CPU, Mem, Disks (12 to 36) 3

Isilon OneFS File System Concurrent access to all files with all protocols CIFS/SMB NFSv3 SSH HTTP/FTP Coming Soon NFSv4 SMB2 4

Permission Basics 5

Unix Permissions Mode bits rwxrwxrwx Read / Write / Execute Owner / Group / Other POSIX ACLs Give rwx permission to other users & groups Closer to NTFS ACLs, but less expressive Replaced in OneFS by NTFS ACLs 6

NTFS Access Control List Approximately 15 rights vs 3 rwx rights. Security Descriptor (SD) Owner, Group Discretionary ACL (ACL) List of Access Control Entries (ACE) System ACL ACE User / Group Identifier (UID/GID in OneFS) Allow & Deny List of rights Inheritance 7

Comparison POSIX modes are a complete subset of NTFS rights Minus the top 3 bits SetUID, SetGID, Sticky Order of enforcement is different POSIX 1. Determine identity 2. Check 1 of 3 possible lists NTFS 1. Determine identity 2. Check 1 list 8

Permission Modification POSIX semantics: chmod: Only owner/root chown: Only root chgrp: Only owner/root, only to groups they are part of NTFS semantics: chmod: Needs WRITE_DAC; owner can always change permissions chown: Needs WRITE_OWNER; cannot give away a file chgrp: Needs WRITE_OWNER; can change to any group OneFS: Global Policy dictates behavior regardless of protocol 9

NFSv4 Access Control List Small Differences Uses principals instead of IDs, e.g. user@domain uid/gid allowed for backwards compatibility New Rights ACE4_WRITE_RETENTION / ACE4_WRITE_RETENTION_HOLD Mappable to ACE4_WRITE_ATTRIBUTES Mostly Identical to NTFS ACL 10

Isilon Implementation 11

Design Goals Store one authoritative set of permissions per file Preference NTFS ACL over mode bits Enforce identical permissions for all protocols Provide view of alternate permission type: NFS is returned approximated mode bits SMB is returned a SYNTHETIC ACL Provide configuration through global permission policy Extend standard Unix tools for all permission management ls, chmod, chown, chgrp 12

SMB File Creation Store ACL 1) SD sent with create : Store provided ACL 2) Inheritable ACL exists on parent : Store Inherited ACL 3) No Inheritable ACL exists : Store Default ACL Store approximated mode bits Give NFS clients a view of the permissions Stored mode bits are not used for enforcement Permissive enough to trick client access evaluation 13

NFS File Creation No inheritable ACL exists Store mode bits only Inheritable ACL exists on parent Apply inheritable ACL only Store approximated mode bits 14

Permissions Setting chmod w/ ACL (SMB or local) Store ACL Store approximated mode bits chmod w/ mode bits (NFS or local) No ACL exists Store mode bits ACL exists Merge mode bits with ACL Add/modify ACEs for three identities: owner, group, everyone Leave other identities unchanged Add deny ACEs for bits that are not present Inheritance hierarchy remains 15

Permissions Retrieval SMB If ACL, ACL is returned If mode bits, return SYNTHETIC ACL Not stored on disk, translated on demand NFS Always show stored mode bits 16

Basic Permission Enforcement Goal: Enforce the same access on all files, from all protocols. SMB access on file with ACL Scan through ACL, until desired rights are allowed or denied NFS access on file with mode bits Simple comparison against owner, group or other Algorithm: 1. Convert desired rights / access mask to file s permission type 2. Basic permission enforcement 17

Advanced Enforcement I SMB access on file with mode bits Convert desired rights to Unix permissions List Folder -> Unix READ Create Files or Create Folders or Delete Subfolders/Files -> Unix WRITE Traverse Folder -> Unix EXECUTE Change Permissions, Take Ownership and Delete do not map ACL Policy: rwx = Full Control 18

Advanced Enforcement II NFS/Local access on file with ACL Convert desired access mask to ACL rights Unix READ -> List Folder Unix WRITE -> Create Files AND Create Folders AND Delete Subfolders/Files Unix EXECUTE -> Traverse Folder NFS Server uses Windows rights E.g. Asks for Create Files access instead of WRITE access NFS Access Request needs approximation Unix WRITE -> Create Files OR Create Folders OR Delete Subfolders/Files 19

Advanced Implementation 20

SMB Special Identities Changed UID/GID to struct identity Type / ID Everyone Null Used only for owner or group Group owner Used only for owner attribute CREATOR OWNER / CREATOR GROUP Inherit_only ACE on directory 21

Inheritance Auto Inheritance vs. Dynamic inheritance Auto - provide client with info to propagate ACLs Dynamic - file system handles ACL propagation Necessary for local inheritance propagation Auto Inheritance 1 2 3 Dynamic Inheritance 1 2 3 22

Canonical Order Canonical order: Explicit Deny Explicit Allow Inherited Deny Inherited Allow Enforced by Windows GUI Moves deny ACEs up to the top Windows API allows setting ACEs in any order Problem: Out of order ACLs are necessary to represent POSIX ACLs r-- : Allow read, deny write, deny execute 23

Canonical Order - Example 1 Mode 754 with deny ACEs Simplified output: # chmod 754 file.txt # ls -le file.txt -rwxr-xr-- 1 test-user test-group 0 Sep 1 02:04 file.txt SYNTHETIC ACL 0: user:test-user allow full_control 1: group:test-group allow read, execute 2: group:test-group deny write 3: everyone allow read 4: everyone deny write, execute 24

Canonical Order - Example 2 After adding execute rights for Everyone via Windows GUI: Mode changed from 754 to 555, instead of 755 # ls -le file.txt -r-xr-xr-x 1 test-user test-group 0 Sep 1 02:04 file.txt 0: group:test-group deny write 1: everyone deny write 2: user:test-user allow full_control 3: group:test-group allow read, execute 4: everyone allow read, execute 25

Canonical Order - Example 3 Mode 754 without deny ACEs Simplified output: # chmod 754 file.txt # ls -le file.txt -rwxr-xr-- 1 test-user test-group 0 Sep 1 02:04 file.txt SYNTHETIC ACL 0: user:test-user allow full_control 1: group:test-group allow generic_read, generic_execute 2: everyone allow generic_read Configurable ACL policies for dealing with deny ACEs 26

Configurable Permission Policies Disallow ACL creation Disallow chmod from NFS Chown: Modify the owner/group permissions? Owning group on file creation BSD -> parent folder s owning group Windows/Linux -> user s primary GID 27

Lessons Learned Mixed permissions are challenging, but possible Some decisions must be left up to policy Best practice is to choose a default and document Call to Arms: ACL Interop Spec 28

Questions? Zack Kirsch zack.kirsch@isilon.com Steven Danneman steven.danneman@isilon.com 29