<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-cel-nfsv4-rpc-tls-othername-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="SunRPC x.509 Identity Squashing">Remote Procedure Call Identity Squashing via x.509 Certificate Fields</title>
    <seriesInfo name="Internet-Draft" value="draft-cel-nfsv4-rpc-tls-othername-00"/>
    <author fullname="Rick Macklem">
      <organization abbrev="FreeBSD">FreeBSD Project</organization>
      <address>
        <postal>
          <country>Canada</country>
        </postal>
        <email>rmacklem@uoguelph.ca</email>
      </address>
    </author>
    <author fullname="Chuck Lever" role="editor">
      <organization abbrev="Oracle">Oracle Corporation</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>chuck.lever@oracle.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="31"/>
    <area>Web and Internet Transport</area>
    <workgroup>Network File System Version 4</workgroup>
    <keyword>x.509</keyword>
    <keyword>SubjectAltName</keyword>
    <keyword>otherName</keyword>
    <keyword>NFS</keyword>
    <keyword>SunRPC</keyword>
    <abstract>
      <?line 54?>

<t>This document extends RPC-with-TLS, as described in <xref target="RFC9289"/>, so
that a client's x.509 certificate may carry instructions to the RPC
server to execute all RPC transactions from that client as a single
user identity.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://chucklever.github.io/i-d-rpc-tls-othername/#go.draft-cel-nfsv4-rpc-tls-othername.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-cel-nfsv4-rpc-tls-othername/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        nfsv4 Working Group mailing list (<eref target="mailto:nfsv4@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/nfsv4/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/nfsv4/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/chucklever/i-d-rpc-tls-othername"/>.</t>
    </note>
  </front>
  <middle>
    <?line 61?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="background">
        <name>Background</name>
        <t>The Remote Procedure Call version 2 protocol (RPC, for short) has been
a Proposed Standard for three decades (see <xref target="RFC5531"/> and its
antecedents).
Several important upper layer protocols, such as the family of Network
File System protocols (most recently described in <xref target="RFC8881"/> are based
on RPC.</t>
        <t>In 2022, the IETF published <xref target="RFC9289"/>, which specifies a mechanism
by which RPC transactions can be cryptographically protected during
transit. This protection includes maintaining confidentiality and
integrity, and the authentication of the communicating peers.</t>
      </section>
      <section anchor="problem-statement">
        <name>Problem Statement</name>
        <t><xref section="4.2" sectionFormat="of" target="RFC9289"/> states that:</t>
        <ul empty="true">
          <li>
            <t>RPC user authentication is not affected by
the use of transport layer security.  When a client presents a TLS
peer identity to an RPC server, the protocol extension described in
the current document provides no way for the server to know whether
that identity represents one RPC user on that client or is shared
amongst many RPC users.  Therefore, a server implementation cannot
utilize the remote TLS peer identity to authenticate RPC users.</t>
          </li>
        </ul>
        <t>Mobile devices such as laptops are typically used by a single user and
do not have a fixed, well known IP host address or fully qualified DNS name.
The lack of a well known fixed IP host address or fully qualified DNS name
weakens the verification checks that may be done on the client's X.509
certificate by the server.  As such, this extension allows the client to be
restricted to a single user entity on the server, limiting the scope of risk
associated with allowing access to the server.</t>
        <t>When a service is running in a dedicated VM or container, it often
runs as a single assigned user identity. Handling this user identity
using Kerberos is problematic, since Kerberos TGTs typically expire
in a matter of hours and the service is typically a long running task.
This extension allows the client to specify the single assigned user
identity to the server in a manner that will not expire for a significant
period of time.</t>
        <t>When an RPC server replaces incoming RPC user identities with a single
user identity, for brevity we refer to this as "identity squashing".</t>
      </section>
      <section anchor="summary-of-proposed-solution">
        <name>Summary of Proposed Solution</name>
        <t>In the interest of enabling the independent creation of interoperating
implementations of RPC identity squashing, this document proposes the
use of the x.509 SubjectAltName otherName field to carry a RPC user
identity.
For these user squashing instructions,
this document establishes a fixed object identifier
carried in the "type-id" part of the otherName field,
and specifies the format of the "value" part of the otherName
field when "type-id" carries the new object identifier.
The document also provides normative guidance on how the "value"
is to be interpreted by RPC servers.</t>
      </section>
      <section anchor="open-questions">
        <name>Open Questions</name>
        <ul spacing="normal">
          <li>
            <t>Should this be an NFS-only feature, or should it be an RPC-layer
feature?</t>
          </li>
          <li>
            <t>Standardizing a fixed OID is necessary for interoperability, but
are we required to allocate that OID from a particular arc?</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="x509-certificate-subjectaltname-field">
      <name>x.509 Certificate SubjectAltName Field</name>
      <t>As specified in <xref section="4.2.1.6" sectionFormat="of" target="RFC5280"/>:</t>
      <ul empty="true">
        <li>
          <t>The subjectAltName <bcp14>MAY</bcp14> carry additional name types through the use of
the otherName field.  The format and semantics of the name are
indicated through the OBJECT IDENTIFIER in the type-id field.  The
name itself is conveyed as value field in otherName.</t>
        </li>
      </ul>
      <t>This document specifies new uses of the otherName field to carry an
RPC user identity. The receiving system (an RPC server) then
converts all RPC users (as carried in the RPC header credential and
verifier fields) to the user identity specified in the certificate.</t>
      <section anchor="authsys-identities">
        <name>AUTH_SYS Identities</name>
        <section anchor="othername-oid-for-authsys">
          <name>otherName OID for AUTH_SYS</name>
          <aside>
            <t>State the Object Identifier to be used to indicate this form
  of RPC user identity</t>
          </aside>
        </section>
        <section anchor="format-of-the-othername-value">
          <name>Format of the otherName Value</name>
          <aside>
            <t>This will be a set of 32-bit integers that specify a numeric UID,
  and a counted list of 32-bit integers that specify numeric GIDs.</t>
          </aside>
        </section>
      </section>
      <section anchor="kerberos-v5-principals">
        <name>Kerberos V5 Principals</name>
        <section anchor="othername-oid-for-authsys-1">
          <name>otherName OID for AUTH_SYS</name>
          <aside>
            <t>State the Object Identifier to be used to indicate this form
  of RPC user identity</t>
          </aside>
        </section>
        <section anchor="format-of-the-othername-value-1">
          <name>Format of the otherName Value</name>
          <t>The otherName value contains a principal name as described in
<xref section="4" sectionFormat="of" target="RFC2743"/>.</t>
        </section>
      </section>
      <section anchor="nfsv4-user-domain-string-identities">
        <name>NFSv4 User @ Domain String Identities</name>
        <section anchor="othername-oid-for-string-identities">
          <name>otherName OID for String Identities</name>
          <aside>
            <t>State the Object Identifier to be used to indicate this form
  of RPC user identity</t>
          </aside>
        </section>
        <section anchor="format-of-the-othername-value-2">
          <name>Format of the otherName Value</name>
          <aside>
            <t>Follow recommendations of draft-ietf-nfsv4-internationalization-latest
  to form an internationalized "user@domain" string similar to NFSv4 ID
  map strings.</t>
          </aside>
        </section>
      </section>
    </section>
    <section anchor="extending-this-mechanism">
      <name>Extending This Mechanism</name>
      <t>It is possible that in the future, RPC servers might implement other forms
of RPC user identity, such as Windows Security Identifiers (SSIDs) <xref target="SSID"/>.
This section describes how standards action can extend the mechanism
specified in this document to accommodate new forms of user identity.</t>
      <aside>
        <t>Provide the base level of general requirements that we will have to
  meet in this document as instructions to future authors. I'm not
  sure yet exactly what those are.</t>
      </aside>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <aside>
        <t>This section is to be removed before publishing this document as an RFC.</t>
      </aside>
      <t>This section records the status of known implementations of the
protocol defined by this specification at the time of posting of this
Internet-Draft, and is based on a proposal described in
<xref target="RFC7942"/>. The description of implementations in this section is
intended to assist the IETF in its decision processes in progressing
drafts to RFCs.</t>
      <t>Please note that the listing of any individual implementation here
does not imply endorsement by the IETF. Furthermore, no effort has
been spent to verify the information presented here that was supplied
by IETF contributors. This is not intended as, and must not be
construed to be, a catalog of available implementations or their
features. Readers are advised to note that other implementations may
exist.</t>
      <section anchor="freebsd-nfs-server-and-client">
        <name>FreeBSD NFS Server and Client</name>
        <dl>
          <dt>Organization:</dt>
          <dd>
            <t>FreeBSD</t>
          </dd>
          <dt>URL:</dt>
          <dd>
            <t><eref target="https://www.freebsd.org">https://www.freebsd.org</eref></t>
          </dd>
          <dt>Maturity:</dt>
          <dd>
            <t>Complete.</t>
          </dd>
          <dt>Coverage:</dt>
          <dd>
            <t>The mechanism to represent user@domain strings has been implemented
using an OID from the FreeBSD arc.</t>
          </dd>
          <dt>Licensing:</dt>
          <dd>
            <t>BSD 3-clause</t>
          </dd>
          <dt>Implementation experience:</dt>
          <dd>
            <t>None to report</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <aside>
        <t>Insert request for allocations of a SubjectAltName : otherName object identifiers</t>
      </aside>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9289">
          <front>
            <title>Towards Remote Procedure Call Encryption by Default</title>
            <author fullname="T. Myklebust" initials="T." surname="Myklebust"/>
            <author fullname="C. Lever" initials="C." role="editor" surname="Lever"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document describes a mechanism that, through the use of opportunistic Transport Layer Security (TLS), enables encryption of Remote Procedure Call (RPC) transactions while they are in transit. The proposed mechanism interoperates with Open Network Computing (ONC) RPC implementations that do not support it. This document updates RFC 5531.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9289"/>
          <seriesInfo name="DOI" value="10.17487/RFC9289"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC2743">
          <front>
            <title>Generic Security Service Application Program Interface Version 2, Update 1</title>
            <author fullname="J. Linn" initials="J." surname="Linn"/>
            <date month="January" year="2000"/>
            <abstract>
              <t>This memo obsoletes [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2743"/>
          <seriesInfo name="DOI" value="10.17487/RFC2743"/>
        </reference>
        <reference anchor="RFC7942">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="SSID" target="https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/understand-security-identifiers">
          <front>
            <title>Security Identifiers</title>
            <author>
              <organization>Microsoft</organization>
            </author>
            <date>n.d.</date>
          </front>
          <annotation>Replace this with a reference to an MS standards doc</annotation>
        </reference>
        <reference anchor="RFC5531">
          <front>
            <title>RPC: Remote Procedure Call Protocol Specification Version 2</title>
            <author fullname="R. Thurlow" initials="R." surname="Thurlow"/>
            <date month="May" year="2009"/>
            <abstract>
              <t>This document describes the Open Network Computing (ONC) Remote Procedure Call (RPC) version 2 protocol as it is currently deployed and accepted. This document obsoletes RFC 1831. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5531"/>
          <seriesInfo name="DOI" value="10.17487/RFC5531"/>
        </reference>
        <reference anchor="RFC8881">
          <front>
            <title>Network File System (NFS) Version 4 Minor Version 1 Protocol</title>
            <author fullname="D. Noveck" initials="D." role="editor" surname="Noveck"/>
            <author fullname="C. Lever" initials="C." surname="Lever"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>This document describes the Network File System (NFS) version 4 minor version 1, including features retained from the base protocol (NFS version 4 minor version 0, which is specified in RFC 7530) and protocol extensions made subsequently. The later minor version has no dependencies on NFS version 4 minor version 0, and is considered a separate protocol.</t>
              <t>This document obsoletes RFC 5661. It substantially revises the treatment of features relating to multi-server namespace, superseding the description of those features appearing in RFC 5661.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8881"/>
          <seriesInfo name="DOI" value="10.17487/RFC8881"/>
        </reference>
      </references>
    </references>
    <?line 270?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors are grateful to
Jeff Layton,
Greg Marsden,
and
Martin Thomson
for their input and support.</t>
      <t>Special thanks to
Area Director
Gorry Fairhurst,
NFSV4 Working Group Chairs
Brian Pawlowski
and
Christopher Inacio,
and
NFSV4 Working Group Secretary
Thomas Haynes
for their guidance and oversight.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
