<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.24 -->
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-cel-nfsv4-rpc-tls-pseudoflavors-02" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" obsoletes="" updates="" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.0 -->
  <front>
    <title abbrev="RPC TLS Pseudo-flavors">Pseudo-flavors for Remote Procedure Calls with Transport Layer Security</title>
    <seriesInfo name="Internet-Draft" value="draft-cel-nfsv4-rpc-tls-pseudoflavors-02"/>
    <author initials="C." surname="Lever" fullname="Charles Lever">
      <organization abbrev="Oracle">Oracle Corporation</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>chuck.lever@oracle.com</email>
      </address>
    </author>
    <date year="2021" month="December" day="27"/>
    <area>Transport</area>
    <workgroup>Network File System Version 4</workgroup>
    <abstract>
      <t>Recent innovations in Remote Procedure Call (RPC) transport layer security
enable broad deployment of encryption and mutual peer authentication
when exchanging RPC messages.
These security mechanisms can protect peers who continue to use
the AUTH_SYS RPC auth flavor, which is not cryptographically secure,
on open networks.
This document introduces RPC auth pseudo-flavors
that an RPC service can use to indicate
transport layer security requirements for accessing that service,
and a mechanism the service can use to enforce those requirements.</t>
    </abstract>
    <note>
      <name>Note</name>
      <t>This note is to be removed before publishing as an RFC.</t>
      <t>Discussion of this draft occurs on the <eref target="nfsv4@ietf.org">NFSv4 working group mailing
list</eref>, archived at
<eref target="https://mailarchive.ietf.org/arch/browse/nfsv4/"/>. Working Group
information is available at
<eref target="https://datatracker.ietf.org/wg/nfsv4/about/"/>.</t>
      <t>Submit suggestions and changes as pull requests at
<eref target="https://github.com/chucklever/i-d-rpc-tls-pseudoflavors"/>.
Instructions are on that page.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Each RPC transaction may be associated with a user and a set of groups.
That transaction's RPC auth flavor determines how the user and groups are
identified and whether they are authenticated.
Peers that host applications and RPC services may also be
identified and authenicated in each RPC transaction,
again depending on that transaction's RPC auth flavor <xref target="RFC5531" format="default"/>.</t>
      <t>Not all flavors provide peer and user identification and authentication.
For example, the traditional RPC auth flavor AUTH_NONE identifies no
user or group and provides no authentication of users or peers.
The traditional RPC auth flavor AUTH_SYS provides identification of
peers, users, and groups, but does not provide authentication of any of these.</t>
      <t>Moreover, unlike some GSS security services, these RPC auth flavors
provide no confidentiality or integrity checking services.
Therefore AUTH_NONE and AUTH_SYS are considered insecure.</t>
      <t>Mutual peer authentication and encryption provided at the transport
layer can make the use of AUTH_NONE and AUTH_SYS more secure.
An RPC service might want to indicate to its clients that it will not
allow access via AUTH_NONE or AUTH_SYS unless transport layer security
services are in place. To do that, this document specifies
several pseudo-flavors that upper layers such as NFS <xref target="RFC8881" format="default"/>
can use to enforce stronger security when
unauthenticated RPC auth flavors are in use.</t>
      <t>The author expects that,
in addition to RPC-with-TLS <xref target="I-D.ietf-nfsv4-rpc-tls" format="default"/>,
other novel RPC transports will eventually appear that
provide similar security features.
These transports can benefit from the pseudo-flavors
defined in this document, or this approach can be extended if
new transport security features require it.</t>
      <section anchor="terminology" numbered="true" toc="default">
        <name>Terminology</name>
        <t>This document adopts the terminology introduced in Section 3 of
<xref target="RFC6973" format="default"/> and assumes a working knowledge of the Remote Procedure
Call (RPC) version 2 protocol <xref target="RFC5531" format="default"/> and the Transport Layer
Security (TLS) protocol <xref target="RFC8446" format="default"/>.</t>
        <t>This document adheres to the convention that a "client" is a network
host that actively initiates an association, and a "server" is a
network host that passively accepts an association request.</t>
        <t>For the purposes of this document, an Upper-Layer Protocol is an
RPC Program and Version tuple comprised of a set of procedure
calls defining a single API. One example of a ULP is the
Network File System Version 4.0 <xref target="RFC7530" format="default"/>.</t>
        <t>An "RPC auth flavor" is a set of protocol elements that can identify
a network peer and a user and possibly authenticate either or both.
<xref section="13.4.2" sectionFormat="of" target="RFC5531" format="default"/> explains the differences between
RPC auth flavors and pseudo-flavors.</t>
        <t>RPC documentation historically refers to the authentication of a
host as "machine authentication" or "host authentication".
TLS documentation refers to the same as "peer authentication".
The current document uses only "peer authentication".</t>
        <t>The term "user authentication" in the current document refers
specifically to the RPC caller's credential provided in the "cred"
and "verf" fields in each RPC Call.</t>
        <t>This document uses the term "insecure RPC auth flavor"
(or "insecure flavor" for short) to refer to a class of
RPC auth flavors which provide no user or peer authentication.
Two prime examples of an insecure RPC auth flavor are
AUTH_NONE and AUTH_SYS.</t>
      </section>
    </section>
    <section anchor="requirements-language" numbered="true" toc="default">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="rpc-auth-pseudo-flavors-for-transport-layer-security" numbered="true" toc="default">
      <name>RPC Auth Pseudo-flavors for Transport Layer Security</name>
      <t><xref section="4" sectionFormat="of" target="I-D.ietf-nfsv4-rpc-tls" format="default"/> introduces a special
RPC auth flavor known as AUTH_TLS. This RPC auth flavor is
used only in a NULL procedure that probes the presence of
support for RPC-with-TLS, and acts as a STARTTLS barrier.</t>
      <t>This auth flavor does not carry the identity of the peer
or a user. RPC clients do not use this RPC auth flavor
to authenticate users in RPC Calls for non-NULL RPC procedures.</t>
      <t>Once transport layer security has been established between
two RPC peers, an RPC client can use insecure flavors
when forming RPC Calls
with knowledge that the RPC server is known and trusted, and
without concern that the communication can be altered or monitored.</t>
      <t>In some cases an RPC service might want to restrict access to
only clients that have authenticated, or perhaps only when
encryption protects communication. The pseudo-flavors defined
below enable RPC-based services to indicate and enforce access
restrictions of this type.</t>
      <section anchor="definitions-of-new-pseudo-flavors" numbered="true" toc="default">
        <name>Definitions of New Pseudo-flavors</name>
        <t>This document specifies several pseudo-flavors that
servers may advertise to clients via mechanisms not defined here.
Using the RPC auth flavor registry instantiated in <xref target="RFC5531" format="default"/>
gives us leeway to introduce a narrow basic set of pseudoflavors
in this document and then expand them, via additional documents,
as needs arise.</t>
        <t>RPC clients continue to use AUTH_NONE (0) or AUTH_SYS (1)
in individual transactions while the network transport service
provides cryptographically secure authentication or encryption,
as follows:</t>
        <ul spacing="normal">
          <li>The new pseudo-flavor AUTH_NONE_MPA indicates that
the client may use the AUTH_NONE RPC auth flavor only if
both peers have mutually authenticated.
Encryption of traffic between these peers is not required.</li>
          <li>The new pseudo-flavor AUTH_NONE_ENC indicates that
the client may use the AUTH_NONE RPC auth flavor only if
traffic between these peers is encrypted.
Mutual peer authentication is not required.</li>
          <li>The new pseudo-flavor AUTH_NONE_MPA_ENC indicates that
the client may use the AUTH_NONE RPC auth flavor only if
both peers have mutually authenticated and
traffic between these peers is encrypted.</li>
          <li>The new pseudo-flavor AUTH_SYS_MPA indicates that
the client may use the AUTH_SYS RPC auth flavor only if
both peers have mutually authenticated.
Encryption of traffic between these peers is not required.</li>
          <li>The new pseudo-flavor AUTH_SYS_ENC indicates that
the client may use the AUTH_SYS RPC auth flavor only if
traffic between these peers is encrypted.
Mutual peer authentication is not required.</li>
          <li>The new pseudo-flavor AUTH_SYS_MPA_ENC indicates that
the client may use the AUTH_SYS RPC auth flavor only if
both peers have mutually authenticated and
traffic between these peers is encrypted.</li>
        </ul>
        <t>Because the RPC layer is not aware of pseudo-flavors,
the Upper-Layer Protocol is responsible for ensuring that
appropriate transport layer security is in place
when clients use AUTH_SYS or AUTH_NONE. The next section
explains how server implementations enforce the use of
transport layer security.</t>
      </section>
    </section>
    <section anchor="channel-binding" numbered="true" toc="default">
      <name>Channel Binding</name>
      <t>Certain aspects of transport layer security are not new.
A deployment might choose to run NFS on a virtual private network
established via an ssh tunnel or over IPsec, for example.
The Generic Security Service Application Program Interface (GSS-API)
specification <xref target="RFC2743" format="default"/> recognized the use of security provided
by transport services underlying GSS with the introduction of
channel binding. <xref target="RFC5056" format="default"/> further describes channel binding
as a concept that...</t>
      <ul empty="true">
        <li>
          <t>...allows applications to establish that
the two end-points of a secure channel at one network layer are the
same as at a higher layer by binding authentication at the higher
layer to the channel at the lower layer.  This allows applications to
delegate session protection to lower layers, which has various
performance benefits.</t>
        </li>
      </ul>
      <t>We are particularly interested in ensuring that the mutual authentication
done during a TLS handshake (most recently specified in <xref target="RFC8446" format="default"/>)
on a transport service that handles RPC traffic
can be recognized and used by Upper-Layer Protocols
for securely authenticating the communicating RPC peers.</t>
      <t><xref section="7" sectionFormat="of" target="RFC5929" format="default"/> identifies a set of API characteristics that
RPC and its underlying transport provide to such protocols.</t>
      <section anchor="tls-channel-binding" numbered="true" toc="default">
        <name>TLS Channel Binding</name>
        <t><xref target="RFC5929" format="default"/> defines several TLS channel binding types that Upper-Layer
Protocol implementations can use to determine
whether appropriate security is in place to protect RPC transactions
that continue to use insecure RPC auth flavors such as AUTH_SYS.</t>
        <t>When used with a Certificate handshake message,
the 'tls-server-end-point' channel binding type
as defined in <xref section="4" sectionFormat="of" target="RFC5929" format="default"/>
serves as authentication for securing pseudo-flavors that require
mutual peer authentication.</t>
        <t>RPC-with-TLS requires the use of TLS session encryption
<xref target="I-D.ietf-nfsv4-rpc-tls" format="default"/>.
The presence of TLS under an RPC transport is enough to secure
pseudo-flavors that require encryption.
A peer can use channel binding to determine
whether peer authentication has also occurred
and
whether that authentication was mutual or server-only.</t>
        <t>Moreover, in the particular case of TLS, when a handshake fails,
both peers are made aware of the failure reason via the Finished message.
The failure reason can then be reported to the Upper-Layer Protocol
so the local administrator can take specific corrective action.</t>
        <t>For instance, an RPC server's local security policy might require that
the RPC client's IP address or hostname match its certificates Subject
Alt Name (SAN). This is not always possible if the client's IP address
and hostname are assigned dynamically. When such a server causes a
handshake failure, administrators can be made aware that
the server's SAN policy restricted a client's access,
and corrective action can then be taken.</t>
      </section>
      <section anchor="sshv2-channel-binding" numbered="true" toc="default">
        <name>SSHv2 Channel Binding</name>
        <t>When RPC traverses an SSHv2 tunnel established between an RPC server
and an RPC client,
the 'tls-unique' channel binding type
as defined in <xref section="3" sectionFormat="of" target="RFC5929" format="default"/>
can be used to authenticate peer endpoints and
provide appropriate confidentiality.</t>
      </section>
      <section anchor="channel-binding-for-rdma-transports" numbered="true" toc="default">
        <name>Channel Binding for RDMA Transports</name>
        <t>As of this writing, RPC-over-RDMA <xref target="RFC8166" format="default"/> does not provide a
transport layer security service. However, <xref section="5" sectionFormat="of" target="RFC5056" format="default"/>
suggests a mechanism by which channel binding can protect
RDDP <xref target="RFC5040" format="default"/>, the protocol that handles
remote direct data placement for the iWARP family of protocols.
The transport layer underlying RDDP might use
IPsec <xref target="RFC6071" format="default"/>,
TLS <xref target="RFC8446" format="default"/>,
or
Encapsulating Security Payload (ESP) <xref target="RFC4303" format="default"/>.</t>
      </section>
    </section>
    <section anchor="nfs-examples" numbered="true" toc="default">
      <name>NFS Examples</name>
      <t>This section presents examples of how a commonly-used
Upper-Layer Protocol (NFS) can make use of these pseudo-flavors.</t>
      <section anchor="network-file-system-versions-2-and-3" numbered="true" toc="default">
        <name>Network File System Versions 2 and 3</name>
        <t>NFSv3 clients use the MNT procedure, defined in <xref section="I" sectionFormat="of" target="RFC1813" format="default"/>,
to discover which RPC auth flavors may be used to access a particular
shared NFSv3 filesystem.</t>
        <t>To require NFSv3 clients to employ underlying transport security
when using AUTH_NONE or AUTH_SYS, the NFS server includes one or
more of the new pseudo-flavors defined in <xref target="iana-cons" format="default"/>
in the auth_flavors list that is part of a MNT response.</t>
        <t>When determining whether a filehandle-bearing operation is authorized,
an NFSv3 server uses channel binding to ensure that appropriate
transport layer security is in place before processing
an incoming NFS request that uses an insecure RPC auth flavor.
If that request is not authorized, the NFSv3 server can respond
with an nfs_stat of NFS3ERR_STALE.</t>
        <t>The usage of the MNT procedure as described in <xref target="RFC1094" format="default"/>
is the same with the exception that an NFSv2 server responds
with NFSERR_STALE instead of NFS3ERR_STALE.</t>
      </section>
      <section anchor="network-file-system-version-4" numbered="true" toc="default">
        <name>Network File System Version 4</name>
        <t>NFSv4 clients use the SECINFO or SECINFO_NO_NAME procedures,
as defined in <xref target="RFC8881" format="default"/>, to discover which RPC auth flavors
may be used to access a particular shared NFSv4 filesystem.</t>
        <t>To require NFSv4 clients to employ underlying transport security
when using AUTH_NONE or AUTH_SYS, the NFS server includes one or
more of the new pseudo-flavors defined in <xref target="iana-cons" format="default"/>
in the SECINFO4resok list that is part of a SECINFO or
SECINFO_NO_NAME response.</t>
        <t>When determining whether a filehandle-bearing operation is authorized,
an NFSv4 server uses channel binding to ensure that appropriate
transport layer security is in place before processing
an incoming NFSv4 COMPOUND that uses an insecure RPC auth flavor.
If that request is not authorized, the NFSv4 server terminates
the COMPOUND with a status code of NFS4ERR_WRONGSEC.</t>
        <section anchor="nfsv4-state-protection" numbered="true" toc="default">
          <name>NFSv4 State Protection</name>
          <t>Note: This section updates RFC 8881.</t>
          <aside>
            <t>An alternate approach might place the updates described in
  this section in rfc5661bis.</t>
          </aside>
          <t><xref section="2.4.3" sectionFormat="of" target="RFC8881" format="default"/> explains how an NFSv4 server
determines when an NFSv4 client is authorized to create a new lease
or replace a previous one. This mechanism prevents clients from
maliciously or unintentionally wiping open and lock state for
another client. Section 2.10.8.3 of that document further specifies
how the server responds to unauthorized state changes.</t>
          <t>When used with a Certificate handshake message,
the 'tls-server-end-point' channel binding type
as defined in <xref section="4" sectionFormat="of" target="RFC5929" format="default"/>
can provide protection similar to SP4_MACH_CRED.</t>
          <t>This document modifies the text of the first bullet in
<xref section="2.4.3" sectionFormat="of" target="RFC8881" format="default"/> to include the use of
transport layer security as follows:</t>
          <ul spacing="normal">
            <li>
              <t>The principal that created the client ID for the client owner
is the same as the principal that is sending the EXCHANGE_ID
operation. Note that if the client ID was created with
SP4_MACH_CRED state protection (Section 18.35), either:  </t>
              <ul spacing="normal">
                <li>The principal <bcp14>MUST</bcp14> be based on RPCSEC_GSS authentication,
the RPCSEC_GSS service used <bcp14>MUST</bcp14> be integrity or privacy,
and the same GSS mechanism and principal <bcp14>MUST</bcp14> be used as
that used when the client ID was created. Or,</li>
                <li>The principal <bcp14>MUST</bcp14> be based on AUTH_SYS, and the server
<bcp14>MUST</bcp14> use channel binding to verify the identity of the
client peer when performing any of the operations
specified in the spa_mach_ops bitmaps. Or,</li>
                <li>The principal <bcp14>MUST</bcp14> be based on AUTH_NONE, and the server
<bcp14>MUST</bcp14> use channel binding to verify the identity of the
client peer when performing any of the operations
specified in the spa_mach_ops bitmaps.</li>
              </ul>
            </li>
          </ul>
          <t>Subsequent discussion of SP4_MACH_CRED in <xref target="RFC8881" format="default"/> in
Sections 2.10.5.1, 2.10.8.3, and 2.10.11.3 would need similar
adjustments.</t>
          <t>Further, NFSv4 server implementations may implement a security policy
that restricts the set of clients or security flavors that can
establish a lease via SETCLIENTID or EXCHANGE_ID.
However, <xref target="RFC8881" format="default"/> does not allow EXCHANGE_ID or CREATE_SESSION
to return NFS4ERR_WRONGSEC, and <xref target="RFC7530" format="default"/> does not allow
SETCLIENTID to return NFS4ERR_WRONGSEC.</t>
          <t>NFSv4.1-based protocols might be updated to allow EXCHANGE_ID
or CREATE_SESSION to return NFS4ERR_WRONG_CRED. However, that
solution would be challenging for NFSv4.0, which does not
have a definition for NFS4ERR_WRONG_CRED.</t>
          <aside>
            <t>More discussion is necessary to determine the exact mechanism
to handle this case in both protocols and to determine which
documents need to specify that mechanism.</t>
          </aside>
        </section>
      </section>
    </section>
    <section anchor="implementation-status" numbered="true" toc="default">
      <name>Implementation Status</name>
      <aside>
        <t>This section is to be removed before publishing this document as an RFC.</t>
      </aside>
      <t>This section records the status of known implementations of the
protocol defined by this specification at the time of posting of this
Internet-Draft, and is based on a proposal described in
<xref target="RFC7942" format="default"/>. The description of implementations in this section is
intended to assist the IETF in its decision processes in progressing
drafts to RFCs.</t>
      <t>Please note that the listing of any individual implementation here
does not imply endorsement by the IETF. Furthermore, no effort has
been spent to verify the information presented here that was supplied
by IETF contributors. This is not intended as, and must not be
construed to be, a catalog of available implementations or their
features. Readers are advised to note that other implementations may
exist.</t>
      <t>There are currently no known implementations of the new RPC pseudo-flavors
requested by this document.</t>
    </section>
    <section anchor="security-cons" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>Discussion of shortcomings peculiar to the AUTH_SYS RPC auth flavor
appears in the final paragraph of <xref section="A" sectionFormat="of" target="RFC5531" format="default"/>
and in <xref section="A" sectionFormat="of" target="I-D.ietf-nfsv4-rpc-tls" format="default"/>.</t>
      <t>When implementing or deploying transport layer security to protect
an upper-level RPC protocol:</t>
      <ul spacing="normal">
        <li>RPC clients that support transport layer security <bcp14>SHOULD</bcp14> use it
whenever possible. Typically the only reason not to is when
performance is important and reasonable security can be provided
in some other way.</li>
        <li>RPC clients that support transport layer security and have
the ability to authenticate <bcp14>SHOULD</bcp14> do so. The only reason not to
authenticate is when authentication and encryption can only be
enabled together, performance is paramount, and there are other
available mechanisms that can provide peer authentication securely.</li>
      </ul>
      <t>The pseudo-flavors defined in this document enable RPC servers to indicate
required levels of security so that RPC clients can make informed and
autonomous decisions that balance performance and scalability against
security needs.</t>
      <t>Important security considerations specific to the use of channel binding
are discussed throughout <xref target="RFC5056" format="default"/> and in <xref section="10" sectionFormat="of" target="RFC5929" format="default"/>.</t>
    </section>
    <section anchor="iana-cons" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <aside>
        <t>RFC Editor: In the following subsections, please replace RFC-TBD with
  the RFC number assigned to this document. Furthermore, please remove
  this Editor's Note before this document is published.</t>
      </aside>
      <section anchor="new-rpc-auth-flavors" numbered="true" toc="default">
        <name>New RPC Auth Flavors</name>
        <t>Following Appendix B of <xref target="RFC5531" format="default"/>, this document requests several new entries in the
<eref target="https://www.iana.org/assignments/rpc-authentication-numbers/rpc-authentication-numbers.xhtml">RPC Authentication Flavor Numbers</eref>
registry.
The purpose of these new flavors is to indicate the use of transport
layer encryption or mutual peer authentication with insecure RPC auth flavors.
All new flavors described in the sections below are pseudo-flavors.</t>
      </section>
      <section anchor="pseudo-flavors-for-secure-authnone" numbered="true" toc="default">
        <name>Pseudo-flavors for Secure AUTH_NONE</name>
        <t>The fields in the new entries are assigned as follows:</t>
        <table align="center">
          <thead>
            <tr>
              <th align="left">Identifier String</th>
              <th align="center">Flavor Name</th>
              <th align="center">Value</th>
              <th align="center">Description</th>
              <th align="right">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">AUTH_NONE_MPA</td>
              <td align="center">NONE_MPA</td>
              <td align="center">TBD</td>
              <td align="center">AUTH_NONE with mutual peer authentication</td>
              <td align="right">RFC_TBD</td>
            </tr>
            <tr>
              <td align="left">AUTH_NONE_ENC</td>
              <td align="center">NONE_ENC</td>
              <td align="center">TBD</td>
              <td align="center">AUTH_NONE with transport layer encryption</td>
              <td align="right">RFC_TBD</td>
            </tr>
            <tr>
              <td align="left">AUTH_NONE_MPA_ENC</td>
              <td align="center">NONE_MPA_ENC</td>
              <td align="center">TBD</td>
              <td align="center">AUTH_NONE with peer authentication and encryption</td>
              <td align="right">RFC_TBD</td>
            </tr>
          </tbody>
        </table>
        <t>Please allocate the numeric values from the range 400000-409999.</t>
      </section>
      <section anchor="pseudo-flavors-for-secure-authsys" numbered="true" toc="default">
        <name>Pseudo-flavors for Secure AUTH_SYS</name>
        <t>The fields in the new entries are assigned as follows:</t>
        <table align="center">
          <thead>
            <tr>
              <th align="left">Identifier String</th>
              <th align="center">Flavor Name</th>
              <th align="center">Value</th>
              <th align="center">Description</th>
              <th align="right">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">AUTH_SYS_MPA</td>
              <td align="center">SYS_MPA</td>
              <td align="center">TBD</td>
              <td align="center">AUTH_SYS with mutual peer authentication</td>
              <td align="right">RFC_TBD</td>
            </tr>
            <tr>
              <td align="left">AUTH_SYS_ENC</td>
              <td align="center">SYS_ENC</td>
              <td align="center">TBD</td>
              <td align="center">AUTH_SYS with transport layer encryption</td>
              <td align="right">RFC_TBD</td>
            </tr>
            <tr>
              <td align="left">AUTH_SYS_MPA_ENC</td>
              <td align="center">SYS_MPA_ENC</td>
              <td align="center">TBD</td>
              <td align="center">AUTH_SYS with peer authentication and encryption</td>
              <td align="right">RFC_TBD</td>
            </tr>
          </tbody>
        </table>
        <t>Please allocate the numeric values from the range 410000-419999.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="I-D.ietf-nfsv4-rpc-tls">
          <front>
            <title>Towards Remote Procedure Call Encryption By Default</title>
            <author fullname="Trond Myklebust">
              <organization>Hammerspace Inc</organization>
            </author>
            <author fullname="Charles Lever">
              <organization>Oracle Corporation</organization>
            </author>
            <date day="23" month="November" year="2020"/>
            <abstract>
              <t>   This document describes a mechanism that, through the use of
   opportunistic Transport Layer Security (TLS), enables encryption of
   Remote Procedure Call (RPC) transactions while they are in-transit.
   The proposed mechanism interoperates with ONC RPC implementations
   that do not support it.  This document updates RFC 5531.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-nfsv4-rpc-tls-11"/>
        </reference>
        <reference anchor="RFC5531">
          <front>
            <title>RPC: Remote Procedure Call Protocol Specification Version 2</title>
            <author fullname="R. Thurlow" initials="R." surname="Thurlow">
              <organization/>
            </author>
            <date month="May" year="2009"/>
            <abstract>
              <t>This document describes the Open Network Computing (ONC) Remote Procedure Call (RPC) version 2 protocol as it is currently deployed and accepted.  This document obsoletes RFC 1831.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5531"/>
          <seriesInfo name="DOI" value="10.17487/RFC5531"/>
        </reference>
        <reference anchor="RFC8881">
          <front>
            <title>Network File System (NFS) Version 4 Minor Version 1 Protocol</title>
            <author fullname="D. Noveck" initials="D." role="editor" surname="Noveck">
              <organization/>
            </author>
            <author fullname="C. Lever" initials="C." surname="Lever">
              <organization/>
            </author>
            <date month="August" year="2020"/>
            <abstract>
              <t>This document describes the Network File System (NFS) version 4 minor version 1, including features retained from the base protocol (NFS version 4 minor version 0, which is specified in RFC 7530) and protocol extensions made subsequently.  The later minor version has no dependencies on NFS version 4 minor version 0, and is considered a separate protocol. </t>
              <t>This document obsoletes RFC 5661.  It substantially revises the treatment of features relating to multi-server namespace, superseding the description of those features appearing in RFC 5661.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8881"/>
          <seriesInfo name="DOI" value="10.17487/RFC8881"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC5929">
          <front>
            <title>Channel Bindings for TLS</title>
            <author fullname="J. Altman" initials="J." surname="Altman">
              <organization/>
            </author>
            <author fullname="N. Williams" initials="N." surname="Williams">
              <organization/>
            </author>
            <author fullname="L. Zhu" initials="L." surname="Zhu">
              <organization/>
            </author>
            <date month="July" year="2010"/>
            <abstract>
              <t>This document defines three channel binding types for Transport Layer Security (TLS), tls-unique, tls-server-end-point, and tls-unique-for-telnet, in accordance with RFC 5056 (On Channel Binding).</t>
              <t>Note that based on implementation experience, this document changes the original definition of 'tls-unique' channel binding type in the channel binding type IANA registry.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5929"/>
          <seriesInfo name="DOI" value="10.17487/RFC5929"/>
        </reference>
        <reference anchor="RFC7942">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer">
              <organization/>
            </author>
            <author fullname="A. Farrel" initials="A." surname="Farrel">
              <organization/>
            </author>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section.  This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory.  Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications.  This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC6973">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <author fullname="B. Aboba" initials="B." surname="Aboba">
              <organization/>
            </author>
            <author fullname="J. Peterson" initials="J." surname="Peterson">
              <organization/>
            </author>
            <author fullname="J. Morris" initials="J." surname="Morris">
              <organization/>
            </author>
            <author fullname="M. Hansen" initials="M." surname="Hansen">
              <organization/>
            </author>
            <author fullname="R. Smith" initials="R." surname="Smith">
              <organization/>
            </author>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications.  It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices.  It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
        <reference anchor="RFC7530">
          <front>
            <title>Network File System (NFS) Version 4 Protocol</title>
            <author fullname="T. Haynes" initials="T." role="editor" surname="Haynes">
              <organization/>
            </author>
            <author fullname="D. Noveck" initials="D." role="editor" surname="Noveck">
              <organization/>
            </author>
            <date month="March" year="2015"/>
            <abstract>
              <t>The Network File System (NFS) version 4 protocol is a distributed file system protocol that builds on the heritage of NFS protocol version 2 (RFC 1094) and version 3 (RFC 1813).  Unlike earlier versions, the NFS version 4 protocol supports traditional file access while integrating support for file locking and the MOUNT protocol. In addition, support for strong security (and its negotiation), COMPOUND operations, client caching, and internationalization has been added.  Of course, attention has been applied to making NFS version 4 operate well in an Internet environment.</t>
              <t>This document, together with the companion External Data Representation (XDR) description document, RFC 7531, obsoletes RFC 3530 as the definition of the NFS version 4 protocol.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7530"/>
          <seriesInfo name="DOI" value="10.17487/RFC7530"/>
        </reference>
        <reference anchor="RFC2743">
          <front>
            <title>Generic Security Service Application Program Interface Version 2, Update 1</title>
            <author fullname="J. Linn" initials="J." surname="Linn">
              <organization/>
            </author>
            <date month="January" year="2000"/>
            <abstract>
              <t>This memo obsoletes [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2743"/>
          <seriesInfo name="DOI" value="10.17487/RFC2743"/>
        </reference>
        <reference anchor="RFC5056">
          <front>
            <title>On the Use of Channel Bindings to Secure Channels</title>
            <author fullname="N. Williams" initials="N." surname="Williams">
              <organization/>
            </author>
            <date month="November" year="2007"/>
            <abstract>
              <t>The concept of channel binding allows applications to establish that the two end-points of a secure channel at one network layer are the same as at a higher layer by binding authentication at the higher layer to the channel at the lower layer.  This allows applications to delegate session protection to lower layers, which has various performance benefits.</t>
              <t>This document discusses and formalizes the concept of channel binding to secure channels.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5056"/>
          <seriesInfo name="DOI" value="10.17487/RFC5056"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8166">
          <front>
            <title>Remote Direct Memory Access Transport for Remote Procedure Call Version 1</title>
            <author fullname="C. Lever" initials="C." role="editor" surname="Lever">
              <organization/>
            </author>
            <author fullname="W. Simpson" initials="W." surname="Simpson">
              <organization/>
            </author>
            <author fullname="T. Talpey" initials="T." surname="Talpey">
              <organization/>
            </author>
            <date month="June" year="2017"/>
            <abstract>
              <t>This document specifies a protocol for conveying Remote Procedure Call (RPC) messages on physical transports capable of Remote Direct Memory Access (RDMA).  This protocol is referred to as the RPC-over- RDMA version 1 protocol in this document.  It requires no revision to application RPC protocols or the RPC protocol itself.  This document obsoletes RFC 5666.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8166"/>
          <seriesInfo name="DOI" value="10.17487/RFC8166"/>
        </reference>
        <reference anchor="RFC5040">
          <front>
            <title>A Remote Direct Memory Access Protocol Specification</title>
            <author fullname="R. Recio" initials="R." surname="Recio">
              <organization/>
            </author>
            <author fullname="B. Metzler" initials="B." surname="Metzler">
              <organization/>
            </author>
            <author fullname="P. Culley" initials="P." surname="Culley">
              <organization/>
            </author>
            <author fullname="J. Hilland" initials="J." surname="Hilland">
              <organization/>
            </author>
            <author fullname="D. Garcia" initials="D." surname="Garcia">
              <organization/>
            </author>
            <date month="October" year="2007"/>
            <abstract>
              <t>This document defines a Remote Direct Memory Access Protocol (RDMAP) that operates over the Direct Data Placement Protocol (DDP protocol).  RDMAP provides read and write services directly to applications and enables data to be transferred directly into Upper Layer Protocol (ULP) Buffers without intermediate data copies.  It also enables a kernel bypass implementation.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5040"/>
          <seriesInfo name="DOI" value="10.17487/RFC5040"/>
        </reference>
        <reference anchor="RFC6071">
          <front>
            <title>IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap</title>
            <author fullname="S. Frankel" initials="S." surname="Frankel">
              <organization/>
            </author>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan">
              <organization/>
            </author>
            <date month="February" year="2011"/>
            <abstract>
              <t>Over the past few years, the number of RFCs that define and use IPsec and Internet Key Exchange (IKE) has greatly proliferated.  This is complicated by the fact that these RFCs originate from numerous IETF working groups: the original IPsec WG, its various spin-offs, and other WGs that use IPsec and/or IKE to protect their protocols' traffic.</t>
              <t>This document is a snapshot of IPsec- and IKE-related RFCs.  It includes a brief description of each RFC, along with background information explaining the motivation and context of IPsec's outgrowths and extensions.  It obsoletes RFC 2411, the previous  "IP Security Document Roadmap."</t>
              <t>The obsoleted IPsec roadmap (RFC 2411) briefly described the interrelationship of the various classes of base IPsec documents. The major focus of RFC 2411 was to specify the recommended contents of documents specifying additional encryption and authentication algorithms.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6071"/>
          <seriesInfo name="DOI" value="10.17487/RFC6071"/>
        </reference>
        <reference anchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent">
              <organization/>
            </author>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6.  ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality.  This document obsoletes RFC 2406 (November 1998).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC1813">
          <front>
            <title>NFS Version 3 Protocol Specification</title>
            <author fullname="B. Callaghan" initials="B." surname="Callaghan">
              <organization/>
            </author>
            <author fullname="B. Pawlowski" initials="B." surname="Pawlowski">
              <organization/>
            </author>
            <author fullname="P. Staubach" initials="P." surname="Staubach">
              <organization/>
            </author>
            <date month="June" year="1995"/>
            <abstract>
              <t>This paper describes the NFS version 3 protocol.  This paper is provided so that people can write compatible implementations.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1813"/>
          <seriesInfo name="DOI" value="10.17487/RFC1813"/>
        </reference>
        <reference anchor="RFC1094">
          <front>
            <title>NFS: Network File System Protocol specification</title>
            <author fullname="B. Nowicki" initials="B." surname="Nowicki">
              <organization/>
            </author>
            <date month="March" year="1989"/>
            <abstract>
              <t>This RFC describes a protocol that Sun Microsystems, Inc., and others are using.  A new version of the protocol is under development, but others may benefit from the descriptions of the current protocol, and discussion of some of the design issues.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1094"/>
          <seriesInfo name="DOI" value="10.17487/RFC1094"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments" toc="default">
      <name>Acknowledgments</name>
      <t>David Noveck is responsible for the basic architecture of this
proposal.  The author is also grateful to Bill Baker, Rick Macklem,
Greg Marsden, and Martin Thomson for their input and support.</t>
      <t>Special thanks to Transport Area Directors Martin Duke and
Zaheduzzaman Sarker, NFSV4 Working Group Chairs David Noveck and
Brian Pawlowski, and NFSV4 Working Group Secretary Thomas Haynes for
their guidance and oversight.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
