Rfc0501
TitleUn-muddling "free file transfer"
AuthorK.T. Pogran
DateMay 1973
Format:TXT, HTML
Status:UNKNOWN






Network Working Group                                          K. Pogran
Request for Comments: 501                                    MIT-Multics
NIC: 15718                                                   11 May 1973


                    Un-Muddling "Free File Transfer"

   As the ARPA Network begin to mature, we find ourselves addressing
   issues and concepts deliberately put off and left untouched at
   earlier stages of Network development.  Among the issues now coming
   to the fore are access control, user authentication, and accounting.
   These issues arise immediately out of efforts to develop uniform
   methods for providing limited "free" access to the File Transfer
   Servers of the host systems, to meet user needs for mail transmission
   and similar services.

   Several proposals have been made, described by such phrases as
   "login-less mail", "'free' accounts", "free file transfer", etc.
   These proposals inevitably have imbedded in them some particular
   notion of how such things as access control and user authentication
   are accomplished and these proposals, which knowingly or unknowingly
   make presumptions about the implementation of such mechanisms,
   inevitably meet with strong criticism from implementors whose
   systems' mechanisms are quite different.

   In RFC 467, Bob Bressler proposes ways of helping out users who wish
   to transfer files to or from "systems which have some flavor of
   security, but on which the user has no access privileges".
   Unfortunately, beginning with the first paragraph of the RFC, the
   notions of access controls on files (examples of protection
   mechanisms), and control of access to the system (user
   authentication) are thoroughly muddled.  In addition, he makes
   sweeping assumptions about the nature and use of accounting
   mechanisms and accounts at server sites.  RFC 487 also has buried
   deep within it assumptions about the nature of the access control and
   user authentication aspects of File Transfer Server implementations.

   What's needed at this juncture, of course, is a lucid discussion of
   the general concepts involved in protection mechanisms, and file
   system access controls in particular.  Well, you won't find that in
   the remainder of this RFC.  What you will find is perhaps enough of a
   discussion to un-muddle that which RFC 487 has muddled; the rest will
   have to come down the pike at a later time.

   In many systems, mechanisms which control access to the system,
   mechanism which control access to files, and accounting mechanisms
   all mesh at the moment at which a prospective user of the system is
   authenticated: the system has checked his user-name, password,



RFC 501             Un-Muddling "Free File Transfer"         11 May 1973


   account, or whatever, and decided that he is, indeed, a valid user of
   the system.  This user, who would like to have some information
   processing performed on his behalf, is termed a principal in "privacy
   and protection" parlance.  Some number of processes are initially set
   up for this principal, and some (presumably unforgeable) principal
   identifier is associated with the process(es), so that their requests
   for access to files and other system resources may be properly
   validated.  In addition, the identify of the account to be charged
   for the resources consumed by these processes is associated with the
   processes at this time [1], although on some systems, a process may
   change its account identifier at any time.

   The first question is: Whose principal identifier does a File
   Transfer Server process use? There are at least two possibilities: 1)
   the File Transfer Server can run as a "system daemon" process, with
   (usually) a highly privileged principal identifier.  When acting on
   behalf of a user, it must, itself, interpretively evaluate that
   user's access to a desired file.  Also, it must be able to charge
   that user's account for the resources it uses.  2) A File Transfer
   Server process can be given the user's own principal identifier.
   With this implementation, validation of the user's access to files is
   performed automatically by the usual file system mechanisms.

   Paragraph four of RFC 487 clearly presumes implementation 1): "If a
   user connects to an FTP server and makes a file request without
   supplying a user name-password, the server should then examine the
   file access parameters ..." Systems truly concerned about protection
   may prefer implementation 2), and for good reason -- it follows the
   "principle of least privilege", which states that a process should
   execute with as little access privilege as it requires to perform its
   tasks properly.  Running a File Transfer Server process with a user's
   principal identifier rather than with that of a system daemon leaves
   the system far less susceptible to damage caused by incorrect actions
   of the File Transfer Server. [2]

   The next question is: Whom do you charge for file transfers? Bressler
   tries to set down some guidelines for determining who to charge for
   "non-logged-in" (read: "free") file transfer usage: "Clearly, storing
   a file in a user's directory can be charged to that user." How is the
   word "storing" used here? Surely, "that user" can be billed for the
   disk or other storage medium charges incurred by that file which is
   now taking up space, but is it legitimate to charge "that user" for
   the I/O and/or CPU resources used by someone else to transfer a file
   over the Network, and place it into that user's directory? For
   example, should the recipient of Network mail be charged for the
   resources consumed by someone else in sending it? (Would you care to
   pay the postage for all the junk mail that arrives in your home (U.S.
   Mail) mailbox?).



RFC 501             Un-Muddling "Free File Transfer"         11 May 1973


   Over the telephone, Bob explained to me that he desired a mechanism
   which would, for example, enable me, at his request, to transfer a
   file from my system to his directory on his system, without requiring
   that I know his password.  All well and good.  In this situation, it
   would make sense to charge Bressler's account for this file transfer.
   But how does an un-authenticated user tell a server "Charge this to
   Bressler's account because he says it's OK"? Pitfalls abound.  The
   file Transfer Server process needs to be able to charge an arbitrary
   user's account; this again presupposes implementation 1) of the File
   Transfer Server described above (or else any user process in the
   system would have the capability of charging any user's account; this
   seems undesirable).  A more reasonable approach would be to charge
   that instance of the File Transfer Server process to a general
   "Network services" account.  Mechanisms for accomplishing this are
   presented in RFC 491. [3]

   RFC 487 matter-of-factly suggests that retrieval of files in "system"
   directories should be charged to "overhead".  Here too, some broad
   assumptions are made about the nature of accounting mechanisms and
   accounts at server sites.  In addition, an undesirable loss of
   generality is imposed upon the File Transfer Server: It is now
   required to have the capability of distinguishing the pathnames of
   "system" files from those of "user" files.  In a number of systems,
   there is no syntactic distinction between the two, and the same
   general mechanisms can be used to manipulate both kinds of files (if
   a distinction between them can be made at all).  The addition of code
   to the File Transfer Server which examines the pathname given for
   each request, to determine which sort it is, seems to be antithetical
   to the goals of uniformity and generality that many of today's
   systems have achieved.

   The statement that a Network user's file transfer activity can be
   charged to a system-wide "overhead" account contains two assumptions:
   Such an account cannot be presumed to exist on all systems;
   furthermore, if it does exist, in some cases it just isn't the right
   account to charge.  Certainly, a good case can be made that the cost
   of fostering inter-user communication within the ARPA Network
   community (which is what "free" file transfer amounts to) should be
   borne by ARPA, meaning that such activity should be charged to ARPA-
   funded accounts.  If a host system's operation is entirely funded by
   ARPA (or if its management doesn't care who pays for this activity),
   then it makes sense to charge "free" file transfer activity to a
   "system overhead" account.  On the other hand, that isn't the correct
   course of action for a host system whose operation is not funded by
   ARPA, for charging "free" file transfers to "system overhead" would
   result in passing the cost along to local customers who may have no
   interest at all in the ARPA Network.




RFC 501             Un-Muddling "Free File Transfer"         11 May 1973


   Lastly, Bressler suggests that for file retrieval, CPU charges "may
   be sufficiently small to not cause a major problem".  To believe this
   is naivete.  It may appear to be true for a system which doesn't
   charge the user for time spent executing supervisor code, or I/O
   routines, where Network software overhead doesn't show up in the
   user's bill.  In this case, Network software overhead must contribute
   to "general system overhead", the cost of which must be borne by all
   users.  I don't think many people in the Network community would
   consider the actual (as opposed to charged) CPU time spent
   transferring a file to be negligible.  Certainly, if a system is a
   very popular or busy one from a Network standpoint, the cumulative
   CPU time spent on "free" file transfers, viewed at the end of an
   accounting period (a week? a month? a year?) will not be negligible!

   In this RFC, I've picked apart Bob Bressler's RFC 487, mostly because
   of its confusion of several distinct (although related) issues, and
   the implementation assumptions it contains which conflict with (or
   badly bend out of shape) mechanisms and design philosophies existing
   on other systems (in particular, the system I am most familiar with,
   Multics) [4].  The applicability of the discussions in this RFC, I
   think goes beyond that: We've got to acknowledge that it's difficult
   to propose Network-wide mechanisms for providing desirable services
   without building in assumptions about how they are to be implemented.
   We're at a point where we're asking for fairly sophisticated
   services, and proposing correspondingly sophisticated mechanisms.
   It's time to begin talking about how various systems accomplish such
   things as user authentication, access control, and so on, so that we
   can all gain a clearer understanding of such issues, and be able to
   propose mechanisms with fewer implementation assumptions built into
   them.


   END NOTES:

   [1] On some systems, there is a one-to-one correspondence between
   principals and accounts.

   [2] It should be noted that systems which choose implementation 2)
   may require a user authentication sequence (USER, PASS, and possibly
   ACCT commands) before permitting any file transfers, as explicitly
   stated on page 17 of RFC 354 (NIC 10596), and page 20 of RFC 4554
   (NIC 14333).  This authentication sequence would be required to
   ascertain the principal identifier to be associated with the newly-
   spawned File Transfer Server process; the process is not allowed to
   proceed until its principal identifier has been established.






RFC 501             Un-Muddling "Free File Transfer"         11 May 1973


   [3] Note that there are at least two scenarios for accomplishing the
   transfer Bressler desires: Either I "push" the file, using my "User
   FTP" and his system's "FTP Server", or he "pulls" the file, using his
   "User FTP" and my system's "FTP Server".  Bob chose the first
   scenario; it can be argued that, since it is Bob who wanted the file
   transferred, the second scenario is the more appropriate one.  A
   forthcoming RFC by Mike Padlipsky expands on these points, as well as
   an entirely different alternative.

   [4] Padlipsky keeps insisting that I've also shown the superiority of
   implementation 2) of the File Transfer Server (described above), but
   I resist that conclusion.  Those interested may want to look at his
   Unified User-Level Protocol specification, which is based on a
   similar premise.


       [ This RFC was put into machine readable form for entry ]
              [ into the online RFC archives by Via Genie]