pdf 208KB

advertisement
FC-SP: An Overview of the Standard
for Fibre Channel Security
DISC: Third Intelligent Storage Workshop
University of Minnesota DTC – Minneapolis, MN
Fabio Maino <fmaino@cisco.com
>
<fmaino@cisco.com>
Cisco Systems, Inc.
© 2005 Cisco Systems, Inc. All rights reserved.
1
Agenda
• Isn’t Fibre Channel already secure?
• FC-SP, Fibre Channel Security Protocols
Device Authentication
Per Message Security
Policy Distribution
fmajstor@cisco.com
© 2003 Cisco Systems, Inc. All rights reserved.
Copyright © 2005, Cisco Systems, Inc. All rights reserved. Printed in USA.
2
Isn’t Fibre Channel Already Secure?
• Data centers are physically secured
• FC Zoning ensure fabric partitioning
• Out-of-Band Management (e.g.
SNMPv3) is secure
fmajstor@cisco.com
© 2003 Cisco Systems, Inc. All rights reserved.
3
Yes, but…
• Data Centers are growing
Remote replication over FCIP, DWDM/CWDM, …
• Networks are misconfigured
• Fabric Configuration Databases are shared
• Device impersonation is trivial
• Management is done in-band
fmajstor@cisco.com
© 2003 Cisco Systems, Inc. All rights reserved.
Copyright © 2005, Cisco Systems, Inc. All rights reserved. Printed in USA.
4
Agenda
• Isn’t Fibre Channel already secure?
• FC-SP, Fibre Channel Security Protocols
Device Authentication
Per Message Security
Policy Distribution
fmajstor@cisco.com
© 2003 Cisco Systems, Inc. All rights reserved.
5
FC-SP: Fibre Channel Security Protocol
• INCITS/ANSI T11.3 grouped the Security Solutions
for the Fibre Channel Architecture in FC-SP
Started as a study group in mid 2001
Is going through a first round of letter ballot comment
resolutions
Standard will likely closed by the fall 2005
• Parts of the standard are already implemented and
interoperable
fmajstor@cisco.com
© 2003 Cisco Systems, Inc. All rights reserved.
Copyright © 2005, Cisco Systems, Inc. All rights reserved. Printed in USA.
6
FC-SP: Security Architecture
• Device Authentication (sw2sw, sw2host, host2host)
• Per-message data origin authentication, integrity
protection, anti-replay, and secrecy
• Fabric Management Policy Set (as a generalization
of the zoning policy set)
provides role management within a fabric, and access
control to fabric membership, and fabric management
fmajstor@cisco.com
© 2003 Cisco Systems, Inc. All rights reserved.
7
Device Authentication
• Switch to switch, switch to host, and host to host
authentication
As an optional extension of the LOGI procedure
• Enables secure fabric building, edge
authentication, and end-to-end authentication
• A shared key is derived as a by-product of
authentication
fmajstor@cisco.com
© 2003 Cisco Systems, Inc. All rights reserved.
Copyright © 2005, Cisco Systems, Inc. All rights reserved. Printed in USA.
8
Secure Fabric Building
Fibre Channel Fabric Authentication
Au
th
en
tica
c
nti
the
Au
tion
on
a ti
New host wanting to
join the fabric
Authentication
Authentica
tio
n
New switch
wanting to join
the fabric
Authentication
FCIP
Network
New switches wanting to
join the fabric over FCIP
fmajstor@cisco.com
© 2003 Cisco Systems, Inc. All rights reserved.
9
Authentication Mechanisms
• DHCHAP: password based, mandatory
• FCAP: certificate based, optional
• FCPAP: password/verifier based, optional
SRP, Secure Remote Password
• Transported over FC AUTH Protocol
• All mechanisms provide
bi-directional authentication
Key exchange to enable Security Association Negotiation
fmajstor@cisco.com
© 2003 Cisco Systems, Inc. All rights reserved.
Copyright © 2005, Cisco Systems, Inc. All rights reserved. Printed in USA.
10
DHCHAP
• Challenge Authentication Protocol (CHAP),
augmented with a Diffie-Hellman exchange
Better resistance to off-line dictionary attacks
Generates a Shared Key as a by-product of authentication
• Can be integrated with a back-end AAA Infrastructure
(RADIUS)
Enables effective centralized management of device
password
fmajstor@cisco.com
11
© 2003 Cisco Systems, Inc. All rights reserved.
DH-CHAP and RADIUS
Management
Network
Fibre Channel Fabric Authentication
RAD
DH
-C
RADIUS server
for device
authentication
DH
HA
P
CH
Equipped with
HBA supporting
DH-CHAP
AP
New host wanting to
join the fabric
Out-of-band Ethernet
Management Connection
DH-CHAP
TACACS+
server for
device
authentication
RADIUS servers can be
used to hold DH-CHAP
device accounts and
passwords for centralized
authentication
fmajstor@cisco.com
© 2003 Cisco Systems, Inc. All rights reserved.
Copyright © 2005, Cisco Systems, Inc. All rights reserved. Printed in USA.
DH-CHAP
TAC+
New switch
wanting to join
the fabric
DH-CHAP
FCIP
Network
New switches wanting to
join the fabric over FCIP
12
Agenda
• Isn’t Fibre Channel already secure?
• FC-SP, Fibre Channel Security Protocols
Device Authentication
Per Message Security
Policy Distribution
fmajstor@cisco.com
© 2003 Cisco Systems, Inc. All rights reserved.
13
Per-Message Security
• FC frame formats have been extended to provide
per-message security
ESP_Header: protection is afforded at the FC-2 Layer, the
FC “network layer” that transports the bulk of FC traffic
(including SCSI commands and data)
CT_Authentication: protection is afforded for Common
Transport Information Units (CT_IUs), a protocol used for
many control protocols in FC
• Security Services provided are:
Data origin authentication
Integrity protection
Replay protection
Confidentiality
fmajstor@cisco.com
© 2003 Cisco Systems, Inc. All rights reserved.
Copyright © 2005, Cisco Systems, Inc. All rights reserved. Printed in USA.
14
ESP_Header (FCsec)
• It’s the FC equivalent of IPsec
Protects frames at the FC-2 layer
Based on IETF’s ESP (Encapsulated Security Payload)
Protocol
• AES GCM (Galois Counter Mode) likely to be
mandatory to implement
High speed/highly efficient combined mode
(Confidentiality+Integrity)
fmajstor@cisco.com
15
© 2003 Cisco Systems, Inc. All rights reserved.
FC-ESP: Frame Format
FC-2 Payload: 2112 bytes
4
S
O
F
24
FC-2
Frame
Header
4
S
P
I
4
16
S
e
q
F
C
2
F
C
2
F
C
2
N
u
m
O
pt
H
dr
O
pt
H
dr
O
pt
H
dr
Payload Data
(variable)
P
a
d
d
I
n
g
N
H
P
L
Auth.
Data
(var)
C
R
C
E
O
F
Opt. Encryption Scope
Authentication Scope
DF_CTL bit-22 indicates
that the ESP header is
present
fmajstor@cisco.com
© 2003 Cisco Systems, Inc. All rights reserved.
Copyright © 2005, Cisco Systems, Inc. All rights reserved. Printed in USA.
NH: Next Header
PL: Pad Length
16
CT_Authentication
• Protects Common Transport Information Units
(CT_IU)
Used for FC control protocols
• A “Traditional” encryption + Integrity mode is likely
to be mandatory (i.e. AES CBC + XCBC)
• Typically implemented in SW to protect control
traffic only
fmajstor@cisco.com
© 2003 Cisco Systems, Inc. All rights reserved.
17
FC Security Association Negotiation Protocol
• A subset of IKEv2 (over FC AUTH protocol) is used
to negotiate
ESP_Header SAs, or
CT_Authentication SAs
• The shared key resulting from the authentication
exchange is used to authenticate the IKEv2
exchange
• It’s also possible to use a static pre-shared key,
without going through authentication
fmajstor@cisco.com
© 2003 Cisco Systems, Inc. All rights reserved.
Copyright © 2005, Cisco Systems, Inc. All rights reserved. Printed in USA.
18
Authentication + SA Negotiation
AUTH_Negotiation
DH-CHAP
FCPAP
FCAP
Authentication
+
Shared Key
Security Association Establishment (IKEv2)
FC ESP
per-message Security
fmajstor@cisco.com
Common Transport
Security
19
© 2003 Cisco Systems, Inc. All rights reserved.
Secure Fabric
AAA Server
Secure
Fabric
Host to Disk
Authentication and
Encryption
FC
Isolated
Switch
fmajstor@cisco.com
FC
Isolated
Host
© 2003 Cisco Systems, Inc. All rights reserved.
Copyright © 2005, Cisco Systems, Inc. All rights reserved. Printed in USA.
Authenticated Links
Un-Authenticated Links
20
Agenda
• Isn’t Fibre Channel already secure?
• FC-SP, Fibre Channel Security Protocols
Device Authentication
Per Message Security
Policy Distribution
fmajstor@cisco.com
© 2003 Cisco Systems, Inc. All rights reserved.
21
FC-SP Policy Management
• A framework for policy management of a FC
fabric
• Generalization and extension of the zone set
management
• A generic Policy Set defines the policies
enforced by the fabric
Fabric Wide Policies
Switch-related Policies
fmajstor@cisco.com
© 2003 Cisco Systems, Inc. All rights reserved.
Copyright © 2005, Cisco Systems, Inc. All rights reserved. Printed in USA.
22
Policy Objects
• Policy Summary: is an ordered list of pointers to
policy objects
• Switch Membership List: fabric-wide list of
switches member of a fabric
• Device Membership List: fabric wide list of devices
(hosts/disks) member of a fabric
• IP Management List: fabric wide list of IP addresses
enabled for out-of-band management
• Switch Connectivity: per-switch topology policy
• Attribute: fabric wide extensible attribute to be
associated with members of a fabric
fmajstor@cisco.com
23
© 2003 Cisco Systems, Inc. All rights reserved.
Policy Objects
Policy
Summary
Object
Switch
Connectivity
Objects
Switch
Membership
List
Device
Membership
List
IP
Management
List
Attribute
Objects
fmajstor@cisco.com
© 2003 Cisco Systems, Inc. All rights reserved.
Copyright © 2005, Cisco Systems, Inc. All rights reserved. Printed in USA.
24
Scalability
• Scalability for policy information management is
obtained specializing the behavior of the switches
Autonomous Switches, that maintain the Fabric-wide
Policy Objects, their own Switch Connectivity Object, and a
full copy of the FC-SP Zoning Database;
Client Switches, that maintain the Fabric-wide Policy
Objects, their own Switch Connectivity Object, and a
subset of the FC-SP Active Zone Set; and
Server Switches, that maintain the Fabric-wide Policy
Objects, all the Switch Connectivity Objects, and a full copy
of the FC-SP Zoning Database.
fmajstor@cisco.com
© 2003 Cisco Systems, Inc. All rights reserved.
25
References
ftp://ftp.t11.org/t11/pub/fc/sp/05-163v1.pdf (FC-SP v1.71)
http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ciphaes-gcm-00.txt (GCM)
http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ikev217.txt (IKEv2)
fmajstor@cisco.com
© 2003 Cisco Systems, Inc. All rights reserved.
Copyright © 2005, Cisco Systems, Inc. All rights reserved. Printed in USA.
26
OPT-2054
7988_05_2003_c1
fmajstor@cisco.com
©
© 2003,
2003 Cisco
Cisco Systems,
Systems, Inc.
Inc. All
All rights
rights reserved.
reserved.
Copyright © 2005, Cisco Systems, Inc. All rights reserved. Printed in USA.
27
Download