SCSI Security Nuts and Bolts. Ralph Weber, ENDL Texas



Similar documents
Best Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center

SCSI The Protocol for all Storage Architectures

Redundancy in enterprise storage networks using dual-domain SAS configurations

Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците

Status Report on Storage Security Initiatives

Cloud Archiving. Paul Field Consultant

HP iscsi storage for small and midsize businesses

PCI Express IO Virtualization Overview

IP Storage Protocols: iscsi. John L Hufferd, Consultant Hufferd Enterprises

VDI Optimization Real World Learnings. Russ Fellows, Evaluator Group

Block Storage in the Open Source Cloud called OpenStack

Restoration Technologies. Mike Fishman / EMC Corp.

Cryptographic Use Cases and the Rationale for End-to-End Security. Larry Hofer, CISSP Emulex

Saving Private Data An Introduction to Storage Security Richard Austin, MS, CISSP, MCSE

SECURITY SUMMIT 06/06/2013 Roma STORAGE FORENSICS. Litiano Piccin (NCDA-NCIE/SAN)

Creating a Catalog for ILM Services. Bob Mister Rogers, Application Matrix Paul Field, Independent Consultant Terry Yoshii, Intel

Mobile World. Chris Winter SafeNet Inc.

Data Center Transformation. Russ Fellows, Managing Partner Evaluator Group Inc.

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

Enterprise Architecture and the Cloud. Marty Stogsdill, Oracle

Introduction to Data Protection: Backup to Tape, Disk and Beyond. Michael Fishman, EMC Corporation

UNDERSTANDING DATA DEDUPLICATION. Tom Sas Hewlett-Packard

PCI Express Impact on Storage Architectures and Future Data Centers. Ron Emerick, Oracle Corporation

Storage Protocol Comparison White Paper TECHNICAL MARKETING DOCUMENTATION

StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec

Practical Storage Security With Key Management. Russ Fellows, Evaluator Group

Storage Solutions Overview. Benefits of iscsi Implementation. Abstract

Data Center Convergence. Ahmad Zamer, Brocade

ADVANCED DEDUPLICATION CONCEPTS. Larry Freeman, NetApp Inc Tom Pearce, Four-Colour IT Solutions

Windows Host Utilities Installation and Setup Guide

Comparison of Native Fibre Channel Tape and SAS Tape Connected to a Fibre Channel to SAS Bridge. White Paper

Introduction to Data Protection: Backup to Tape, Disk and Beyond. Michael Fishman, EMC Corporation

Eliminating Backup System Bottlenecks: Taking Your Existing Backup System to the Next Level. Jacob Farmer, CTO, Cambridge Computer

Storage Area Network

Benefits of Networked Storage: iscsi & Fibre Channel SANs. David Dale, NetApp

FIBRE CHANNEL OVER ETHERNET

Introduction to MPIO, MCS, Trunking, and LACP

UNDERSTANDING DATA DEDUPLICATION. Jiří Král, ředitel pro technický rozvoj STORYFLEX a.s.

Server and Storage Consolidation with iscsi Arrays. David Dale, NetApp

EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions

Enterprise Architecture and the Cloud. Marty Stogsdill, Oracle

Support for Storage Volumes Greater than 2TB Using Standard Operating System Functionality

SMB 3.0 New Opportunities for Windows Environments

HP LeftHand SAN Solutions

Regulatory Compliance Solutions for Security and Privacy

Trends in Application Recovery. Andreas Schwegmann, HP

File System Design and Implementation

Object Storage A New Architectural Partitioning In Storage

PCI Express Impact on Storage Architectures and Future Data Centers. Ron Emerick, Oracle Corporation

UNDERSTANDING DATA DEDUPLICATION. Thomas Rivera SEPATON

Table of Contents. Introduction Prerequisites Installation Configuration Conclusion Recommended Reading...

Windows Host Utilities 6.0 Installation and Setup Guide

HP Education Services Course Overview

in Transition to the Cloud

Strategies for Firmware Support of Self-Encrypting Drives

: HP HP Version : R6.1

DESIGNING SECURE USB-BASED DONGLES

High Performance Computing OpenStack Options. September 22, 2015

HP Enhanced Implementation Service for SANs

CompTIA Storage+ Powered by SNIA

LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client

Visions for Ethernet Connected Drives. Vice President, Dell Oro Group March 25, 2015

Practical Challenges in Scaling Storage Networks

Six Sigma Performance Analysis for SAN. Dan Iacono, HP

Accelerating Applications and File Systems with Solid State Storage. Jacob Farmer, Cambridge Computer

SAN Conceptual and Design Basics

Solutions for Encrypting Data on Tape: Considerations and Best Practices

Big Data Storage Options for Hadoop Sam Fineberg, HP Storage

Optimizing LTO Backup Performance

FAN An Architecture for Scalable, Service-Oriented Data Management

Ways to Use USB in Embedded Systems

Storage Architectures. Ron Emerick, Oracle Corporation

Cautions When Using BitLocker Drive Encryption on PRIMERGY

Chapter 13 Selected Storage Systems and Interface

Evolving Network Security with the Alcatel-Lucent Access Guardian

RSA Security Analytics. S4 Broker Setup Guide

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Oracle Database Deployments with EMC CLARiiON AX4 Storage Systems

RAID-01 (ciss) B mass storage driver release notes, edition 2

IOmark- VDI. Nimbus Data Gemini Test Report: VDI a Test Report Date: 6, September

Securing SQL Server. Protecting Your Database from. Second Edition. Attackers. Denny Cherry. Michael Cross. Technical Editor ELSEVIER

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.

IP SAN Best Practices

crypto key generate rsa

Direct Attached Storage

SAN and NAS Bandwidth Requirements

How To Understand And Understand The Risks Of Configuration Drift

Datasheet iscsi Protocol

Integration of Microsoft Hyper-V and Coraid Ethernet SAN Storage. White Paper

How to Cost Effectively Retain Reference Data for Analytics and Big Data. Molly Rector, EVP Product Management & WW Marketing, Spectra Logic

Storage Networking Management & Administration Workshop

Introduction to Data Protection: Backup to Tape, Disk and Beyond

Big Data and the Urgency of College- Level Data Storage & Virtualization Curriculum

Storage Networking Foundations Certification Workshop

Configuration Maximums

Storage Area Networks Security Protocols and Mechanisms

Post-production Video Editing Solution Guide with Microsoft SMB 3 File Serving AssuredSAN 4000

What the student will need:

PCI Express and Storage. Ron Emerick, Sun Microsystems

storage elements and computer systems so that data transfer is secure and robust."

Transcription:

SCSI Ralph Weber, ENDL Texas

SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced without modification The SNIA must be acknowledged as source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee. 2

Abstract SCSI The SCSI Command Sets are the lingua franca of computer storage, the language by which computer systems and peripherals communicate to support the storage and retrieval of information - the lifeblood of any modern business. SCSI has evolved from origins in the early 1980s in small computers to support modern SANs that interconnect ten of thousands of peripherals and servers. The latest SCSI standards projects underway in INCITS Technical Committee T10 define the creation of Security Associations, methods of deriving keys & performing strong mutual authentication, per-command security controls supporting multiple levels of protection, support for security protocols defined separately by multiple other standards organizations, and the control and operation of new security features within storage peripherals themselves. This session will cover these new features in detail, and will highlight the new requirements that these features will place on the operation and management of future computer systems and their storage configurations. 3

Notice The authors are NOT attorneys, and nothing in this presentation is intended to be (and should not be) construed as legal advice or opinion. If you need legal advice or a legal opinion, please contact an attorney. The information presented herein represents the authors personal opinions and understanding of the issues involved. The author, contributors, presenter, conference host, and SNIA DO NOT assume any responsibility or liability for damages arising out of any reliance on or use of this information. 4

Agenda 50,000' View History, Terms, Puzzle (some trees some forest), etc. Management Concerns Nuts and Bolts Loose Ends 5

This History of SCSI (in one slide) 1980 1989 SCSI-2 Parallel Bus Disks Tapes 6

This History of SCSI (in one slide) 1980 1989 1990 SCSI-2 Transports Parallel Bus Fibre Channel Commands Block (Disks) Stream (Tapes, Printers) 7

This History of SCSI (in one slide) 1980 1989 1990 Transports SCSI-2 Glue Architecture Shared Commands Parallel Bus Fibre Channel Commands Block (Disks) Stream (Tapes, Printers) 8

This History of SCSI (in one slide) 1980 1989 1990 Today SCSI-2 Architecture (SAM-x) Shared Commands (SPC-x) Transports SPI-x FCP-x SAS-x SBP-x (Firewire) ADT-x (robotics) iscsi USB Bulk Transport Key: Developed by T10 (www.t10.org) Developed by T10 and other groups Developed exclusively by other groups Commands SBC-x/RBC (Disks) SSC-x (Tapes) SES-x (Enclosures) SMC-x (Media Changers) OSD-x (Object Storage) Optical Card Reader 9

Security Enforcement Points Transport Security Affects all commands and data Protection from Wire taps Hackers on the network SCSI Transports USB SAS Fibre Channel iscsi Command Security Affects one command only Command data Not Command itself Not User data Protection from Creative software Hackers on the network Check out SNIA Tutorial: Fibre Channel Technologies: Current and Future Check out SNIA Tutorial: IP Storage Protocols - iscsi 10

Ultimate Security Enforcement Point End-Point An End-Point Uses a Command End-Point Command Security Command Security That is sent across a Transport Transport Security To another End-Point 11

End-Point Postscript Warning: The definition of End-Point is fuzzy. HBA (Host Bus Adapter) builders see End-Point as the HBA 12

End-Point Postscript Warning: The definition of End-Point is fuzzy. HBA builders see End-Point as the HBA Applications see End-Point as their program 13

Transport Level Security Authenticates Hardware (HBAs & Drive Ports) Hardware-based encryption Encrypts/Integrity Checks Whole Frames iscsi Check out SNIA Tutorial: IKE Authentication and Key Exchanges ABCs of Encryption IPsec Encryption and Integrity Checking MACSec Ethernet Encryption and Integrity Checking Fibre Channel FC-SP Clones of IKE and IPsec all in one package 14

Command Level Security Authenticates Builder of the Command Might authenticate the program image Software-based encryption Encrypts/Integrity Checks Only Specific Data Command Data (as currently defined) Encrypt a Tape-Data-Encryption key in transit from Host to Drive Not User Data See SPC-4 (SCSI Primary Commands) and other command standards 15

Security Toolbox Authentication Example: Driver s License Check Integrity Checking Example: Notarized Copy Encryption Example: Pig Latin 16

Security Jigsaw Puzzle Several ways to do the same thing (using Tape-Data-Encryption keys as an example) Transport Level Encryption (Hardware) Encrypt everything Including the Tape-Data-Encryption keys Command Level Encryption Setup Security Association (extra commands) (Software) Encrypt just the Tape-Data-Encryption keys 17

Solving the Security Jigsaw Puzzle No Right (one size fits all) Answer Encrypting everything may be overkill If (for example) the only family jewel on the link is the Tape-Data-Encryption key New Site-Specific Customization Opportunities What to secure... Where? Product Manufacturers Will Help Promote standards Suggest best product uses 18

Agenda 50,000' View Management Concerns Distributing Authentication Info How to Authenticate What to Authenticate Where to Authenticate Nuts and Bolts Loose Ends 19

Distributing the Authentication Info Security Job One is Always Authentication Multiple Ways to Authenticate Multiple Things That Can Be Authenticated Multiple Places to Authenticate Governmental Agencies May Help Make These Choices Check out SNIA Tutorial: Information Security and IT Compliance 20

Distributing the Authentication Info Multiple Ways to Authenticate Devices Certificates (aka Public Key Infrastructure) Shared Secrets (aka passwords) Multiple Things That Can Be Authenticated Devices/Ports Users Programs Multiple Places to Authenticate In the End Devices Central Security Server (e.g., RADIUS) 21

How to Authenticate Multiple Ways to Authenticate Devices Certificates Shared Secrets (aka passwords) Certificates Require a Public Key Infrastructure Books have been written on this Maybe you already have a PKI Shared Secrets Must Be Established Centralized Password or Secret Management 22

What to Authenticate Multiple Things That Can Be Authenticated Devices/Ports Users Programs Affects Where the Authentication Material Must be Distributed too Softer authentication objects might be harder to supply with an authentication identity Standardization for this is in its infancy What your gut says is right may not be supported 23

Where to Authenticate Multiple Places to Authenticate In the End Devices More Management by Walking Around Central Security Server (e.g., RADIUS) More Lines-of-Communication Concerns Well-Designed Security Features Always Give You This Choice 24

Agenda 50,000' View Management Concerns Nuts and Bolts Transport Security (not much new) Command Security (very interesting) Loose Ends 25

Transport Security Authenticates Hardware (HBAs & Drive Ports) Hardware-based encryption Encrypts/Integrity Checks Whole Frames 26

Command Security New Commands New SAs (Security Associations) for Command Uses New Command-Parameter Data Encryption and/or Integrity Checking New Extensions to Commands New Capability-Based Security on Commands 27

Security Commands SECURITY PROTOCOL IN/OUT Command ~225 protocol codes still available for T10 assignment Five protocols already used by T10 IEEE 1667 Host Authentication ATA Drive Locking SD Card TrustedFlash (www.sdcard.org) Six protocols assigned to the Trusted Computing Group (www.trustedcomputinggroup.org) 16 Vendor Specific Check out SNIA Tutorial: TCG Trusted Storage Specifications 28

SECURITY PROTOCOL IN/OUT Very Flexible See list of existing uses Mostly a Data-Transfer Shell Contents Always More Interesting Than Vessel Widespread Tendency to Abbreviate SPIN and SPOUT 29

Command-Based SAs Setup via a Pair of SPIN/SPOUT Protocols Determine Supported Features (one command) Create the SA (two or four commands) Identified by Indices (but with differences from Transport SAs) Two SAs per Creation Operation (In and Out) Best fit for SCSI command structure Index called SAI (Security Association Index) not SPI (Security Parameters Index) because SPI is the name of the Parallel Bus standard Numerous differences in the details too 30

Command-Based SAs SA Pair is Not Qualified by I_T Nexus Use Not Limited to One Pair of SCSI Devices Device Server Required to Assign a Unique SAI to Every SA It Creates Hosts Can Exchange SA Information Out-of-Band and Use SAs Across Any Port How useful this will be is yet to be seen 31

Command Data Encryption Define an SA to Specify Type of Encryption Type of Integrity Checking Use SA to Protect One or More Fields in Command- Related Data Encrypt Some Data Encrypt All Data Ready-to-Use Tools in SPC-4 Used by: Tape-Data-Encryption Keys Capability-Based Command Security Credentials 32

CDB Extensions General Mechanism for Adding Chunks of New Data to Every CDB (Command Data Block) Uses Better than defining hundreds of new CDBs Per-Command Quality of Service Per-Command Usage Classification Capability-Based Command Security Extensions 33

Credential-Based Command Security Authenticate With Credential Server Maybe with SA, maybe other mechanism Request Credential Encrypt Credential using above mentioned SA Extend CDB by Adding Credential See CDB Extensions in previous slide Manage Access to a Resource Defined for Disks, Tapes, and Media Changers 34

Credential-Based Command Security Authenticate With Credential Server Maybe with SA, maybe other mechanism Request Credential Encrypt Credential using above mentioned SA Extend CDB by Adding Credential See CDB Extensions in previous slide Manage Access to a Resource Defined for Disks, Tapes, and Media Changers Much Like Standard OSD (Object-based Storage Device) Security Feature 35

Agenda 50,000' View Management Concerns Nuts and Bolts Loose Ends 36

Where Is All This Headed? The Sky s the Limit Reservations with Authenticated Access Restrictions Non-Credential Command Security Some people think Credential-Based Command Security is too complex Command level SAs seed Transport level SAs Work With Your Equipment Vendors to Request Features You Need 37

Q&A / Feedback Please send any questions or comments on this presentation to SNIA: tracksecurity@snia.org Roger Cummings Many thanks to the following individuals for their contributions to this tutorial. - SNIA Education Committee 38