iscsi Security ELEN 689 Network Security John Price Peter Rega



Similar documents
Securing IP Networks with Implementation of IPv6

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

Network Security Part II: Standards

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Network Access Security. Lesson 10

Virtual Private Networks: IPSec vs. SSL

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Introduction to Computer Security

Introduction to Computer Security

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

21.4 Network Address Translation (NAT) NAT concept

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

Overview of Modern SCSI Networking Protocols

IP Storage Protocols: iscsi. John L Hufferd, Consultant Hufferd Enterprises

Chapter 7 Transport-Level Security

Protocol Security Where?

Implementing and Managing Security for Network Communications

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Security vulnerabilities in the Internet and possible solutions

Device Log Export ENGLISH

IPv6 Security: How is the Client Secured?

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

Cisco Which VPN Solution is Right for You?

TCP Offload Engines. As network interconnect speeds advance to Gigabit. Introduction to

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Lecture 17 - Network Security

Chapter 17. Transport-Level Security

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Lecture 10: Communications Security

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Securing an IP SAN. Application Brief

Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 1

Storage Area Networks Security Protocols and Mechanisms

Chapter 9. IP Secure

Chapter 10. Network Security

TLS and SRTP for Skype Connect. Technical Datasheet

CCT vs. CCENT Skill Set Comparison

Laboratory Exercises V: IP Security Protocol (IPSec)

White Paper Technology Review

IP Security. Ola Flygt Växjö University, Sweden

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Introduction to MPIO, MCS, Trunking, and LACP

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Certes Networks Layer 4 Encryption. Network Services Impact Test Results

Chapter 9 Firewalls and Intrusion Prevention Systems

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

Chapter 4: Security of the architecture, and lower layer security (network security) 1

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

TFTP TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES

NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NETWORK SERVICES

Evaluation of Storage Area Network (SAN) Security and Performance

Measurement of the Usage of Several Secure Internet Protocols from Internet Traces

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

CS 4803 Computer and Network Security

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

How To Understand And Understand The Security Of A Key Infrastructure

Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,

Tim Bovles WILEY. Wiley Publishing, Inc.

Application Note: Onsight Device VPN Configuration V1.1

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Case Study for Layer 3 Authentication and Encryption

Securing EtherNet/IP Using DPI Firewall Technology

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary

Introduction to Security and PIX Firewall

SCSI The Protocol for all Storage Architectures

How To Secure My Data

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

How To Industrial Networking

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Executive Summary and Purpose

Cisco QuickVPN Installation Tips for Windows Operating Systems

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

Solution of Exercise Sheet 5

Post-Class Quiz: Telecommunication & Network Security Domain

Virtual Private Networks

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

A Not So Short iscsi Tutorial. Ming Zhang HPCL, University of Rhode Island 10/03

Pre-lab and In-class Laboratory Exercise 10 (L10)

Network Security. Lecture 3

Building High-Performance iscsi SAN Configurations. An Alacritech and McDATA Technical Note

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Interconnecting Cisco Network Devices 1 Course, Class Outline

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

CCNA Security 1.1 Instructional Resource

KeyStone Architecture Security Accelerator (SA) User Guide

Benefits of Networked Storage: iscsi & Fibre Channel SANs. David Dale, NetApp

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Steelcape Product Overview and Functional Description

Transcription:

iscsi Security ELEN 689 Network Security John Price Peter Rega

Outline iscsi Basics iscsi and NAS Differences iscsi Security Current Vulnerabilities References

iscsi Basics Internet Small Computer Storage Interconnect The iscsi protocol is a mapping of the SCSI remote procedure invocation model over the TCP protocol Two approaches to iscsi implementations: iscsi Appliance and iscsi Gateway Enables the transfer of Block I/O data over an IP network Operates on top of TCP through encapsulation of SCSI commands in the TCP/IP datastream NAS and iscsi Technology Overview, Storage Networking Industry Association, 2006

iscsi Packets (PDU) IP Storage Protocols: iscsi, Storage Networking Industry Association, 2006

PDU Structure BHS is the only required segment in the PDU All segments and digests are padded to the closest integer number of four byte words All multi-byte integers are big-endian Internet Small Computer Systems Interface (iscsi), RFC 3720

Basic Header Segment BHS is always 48 bytes long The opcode and the DataSegmentLength are ALWAYS in the BHS 2 categories of opcodes: initiator and target When used, the Initiator Task Tag and LUN must always be in the same location Internet Small Computer Systems Interface (iscsi), RFC 3720

iscsi Layer Model IP Storage Protocols: iscsi, Storage Networking Industry Association, 2006

iscsi Sessions Sessions can be thought of as a scsi port attached to one or more TCP/IP connection Login phase always begins a session Sessions guarantee SCSI commands delivered in order Can recover from lost connections IP Storage Protocols: iscsi, Storage Networking Industry Association, 2006

iscsi Integrity iscsi adds a cyclic redundancy check (CRC- 32C) along with TCP/IP checksum and Ethernet level CRCs CRC check word is called a digest Header digest and data digest are optional to use in the PDU (MUST be used to fully comply with spec) The Digests insure correct operation, data placement, and data is unmodified

TCP Overhead Every TCP connection has processing overhead potential: Connection setup/teardown Window management Congestion control TCP Segmentation IP Fragmentation Checksum calculations TOEs are helpful but not required for iscsi Therefore, iscsi is currently used for entry level to mid size servers High end implementations would require Gigabit Ethernet and TOE

iscsi vs. NAS NAS and iscsi Technology Overview, Storage Networking Industry Association, 2006

iscsi vs. NAS IP Storage Protocols: iscsi, Storage Networking Industry Association, 2006

iscsi Security Considerations Must prevent against active (man in the middle, masquerading) and passive (snooping) attacks. iscsi protocol allows for configuration without any security measures Use only in extreme cases/closed environments

Phases of iscsi security In-band Initiator-Target Authentication Initial series of connection login packets exchanged between the target and initiator. Security here exists at the iscsi connection level. Targets and Initiators are not required by spec to authenticate each other. Unable to assure secure IP level communications, so care must be taken.

In-band Initiator-Target Authentication In-band authentication only assures users of correct endpoints. If an underlying security mechanism is not used (Ipsec) then all packets are sent in plain text. Only assures initiators that they have connected to a trusted target, and vice-versa.

Methods of In-band Authentication

IP Layer Security iscsi uses IPsec for packet level (IP level) protection. IPsec provides: Cryptographic integrity Authentication Confidentiality If multiple devices are used, then the combined device is considered the iscsi device

iscsi and IPsec Data authentication and integrity is provided by a cryptographic Message Authentication Code (MAC) Types of MAC s Unconditionally secure (one time pad) Hash-fuction based Stream cipher-based Block cipher-based

iscsi and IPsec Any iscsi compliant device must impliment IPsec with ESP in tunnel mode May also provide IPsec in transport mode With the speeds that iscsi can operate at, a single 32 bit number (used as the SA in IPsec) could cycle very fast.

Network Appliance Vulnerability Unauthenticated iscsi Initiators can bypass iscsi authentication on NetApp Filers by manipulating the iscsi Login Negotiation protocol. Login negotiation is in 3 phases: Security Mode: client and server verify identity Operational Mode: client and server negotiate session Full Feature Mode: client and server exchange SCSI commands Clients can force server to go to operational mode without proving identity Data stored on iscsi-mapped LUNs can be read and altered by the attacker Has been fixed by Network Appliances

Linux-iSCSI Vulnerability Linux iscsi implementation installs the iscsi.conf file with worldreadable permissions on some OS s, which allow local users to gain access to the cleartext CHAP password Only exploitable locally Would allow a local attacker to corrupt the password, obtain user passwords, or manipulate data

References Hibbard, Eric, Hitatchi Data Systems, Security 1: Storage Security - Beyond the Introduction, 2006 Storage Network Industry Association Huffard, John L., and Zamar, Ahmed, IP Storage Protocols: iscsi, 2006 Storage Network Industry Association Singer, Wolfgang, IBM Austria, NAS and iscsi Technology Overview, 2006 Storage Network Industry Association Internet Small Computer Systems Interface (iscsi), RFC 3720, http://www.ietf.org/rfc/rfc3720.txt SecurityFocus, Network Appliance iscsi Authentication Bypass, http://www.securityfocus.com/archive/1/414558 Linux-iSCSI Vulnerability, http://nvd.nist.gov/nvd.cfm?cvename=cve-2002-0849 http://www.rsasecurity.com/rsalabs/node.asp?id=2177