SORT BY:

LIST ORDER
THREAD
AUTHOR
SUBJECT


SEARCH

IPS HOME


    [Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

    RE: Relation between iSCSI session and IPSec SAs



    Hi, thank you for your answers!
    May be I have mixed something before I came out with my question. I
    understand that it is possible and reasonable to secure all tcp connections
    with the same IKE phase 2 SA if the tcp connections have following
    properties:
    - belong to the same iSCSI session
    - are between the same IP address pair.
    If this is the security policy then the tcp ports could be eliminated as
    selectors for the out-bound traffic to reduce the complexity of realization.
    The consequence of this reduction would be that you can't separate out-bound
    packets from multiple iSCSI sessions between the same IP address pair and
    there is also currently no requirement to do this (David). In this case it
    makes no sense to fulfill following demand of draft-ips-security-11 for a
    new multiple iSCSI session if there is already an IKE phase 1 SA for an
    existing multiple iSCSI session between the same IP address pair:
    "In order to create a new iSCSI Session, an Initiator implementing iSCSI
    security first establishes an IKE Phase 1 SA.  Subsequent iSCSI connections
    established within the iSCSI session will typically be protected by IKE
    Phase 2 SAs derived from that IKE Phase 1 SA, although additional IKE Phase
    1 SAs can also be brought up."
    It is possible to change this formulation for multiple iSCSI sessions
    between a given IP address pair?
    Greetings
    Christina
    
    
    > -----Original Message-----
    > From: Srinivasa Addepalli [mailto:srao@intotoinc.com]
    > Sent: Friday, May 03, 2002 1:04 PM
    > To: Bernard Aboba
    > Cc: Christina Helbig; ips@ece.cmu.edu
    > Subject: Re: Relation between iSCSI session and IPSec SAs
    > 
    > 
    > 
    > Security Policy Database, as defined by RFC2401 (Section 4.4.1) is
    > flexibile enough to create security associations for individual
    > TCP connections and for set of TCP/IP connections. For clarity, I am
    > listing down the portion of the RFC here:
    >  "   For each selector, the policy entry specifies how
    >    to derive the corresponding values for a new Security Association
    >    Database (SAD, see Section 4.4.3) entry from those in the 
    > SPD and the
    >    packet (Note that at present, ranges are only supported for IP
    >    addresses; but wildcarding can be expressed for all selectors):
    > 
    >            a. use the value in the packet itself -- This will 
    > limit use
    >               of the SA to those packets which have this 
    > packet's value
    >               for the selector even if the selector for the 
    > policy entry
    >               has a range of allowed values or a wildcard for this
    >               selector.
    >            b. use the value associated with the policy entry 
    > -- If this
    >               were to be just a single value, then there would be no
    >               difference between (b) and (a).  However, if the allowed
    >               values for the selector are a range (for IP 
    > addresses) or
    > 
    >               wildcard, then in the case of a range,(b) would 
    > enable use
    >               of the SA by any packet with a selector value within the
    >               range not just by packets with the selector value of the
    >               packet that triggered the creation of the SA.  
    > In the case
    >               of a wildcard, (b) would allow use of the SA by packets
    >               with any value for this selector. "
    > 
    > If security association is required for each TCP connection between
    > iSCSI initiator and target, then Security policy can be configured
    > to create security associations based on packet values for sourceIP,
    > destination IP, protocol, SP and DP.
    >  
    > If Security association is required for all connections between a
    > iSCSI initiator and target, then security policy can be configured
    > to depend on packet values for Source IP and destination IP and policy
    > values for others.
    > 
    > Since, SPD itself provides this granularity, I think, there 
    > is no need for
    > any communication/relation between iSCSI layer and IPSEC layer.
    > 
    > 
    > Srini
    > On Fri, 3 May 2002, Bernard Aboba wrote:
    > 
    > > >From the minutes of Minneapolis:
    > > >"...a single IPSec Phase 2 SA per TCP connection ...had no 
    > security 
    > > > >value."
    > > >I agree and like to extend this:
    > > 
    > > >"...a single IKE negotiation per multiple iSCSI session 
    > (between the >same 
    > > >IP addresses of initiator and target) ...had no security value."
    > > 
    > > If you are saying that it it doesn't matter how many IKE 
    > phase 2 SAs 
    > > correspond to a given IKE Phase 1 SA, then I would agree. 
    > Is this what you 
    > > meant?
    > > 
    > > >Must we negotiate per multiple session (and evaluate 
    > packets >additional 
    > > >for a session identifier) or must we not?
    > > 
    > > I think that the bottom line is that an iSCSI session needs 
    > to be protected 
    > > by an IKE phase 2 SA. You can have multiple iSCSI sessions 
    > per phase 2 SA. 
    > > You can have multiple phase 2 SAs per phase 1 SA. Those are 
    > implementation 
    > > decisions that generally don't influence the security 
    > properties, except in 
    > > a few exceptional conditions (e.g. QoS marking, desire to 
    > protect iSCSI 
    > > sessions with different transforms).
    > > 
    > > _________________________________________________________________
    > > Join the world's largest e-mail service with MSN Hotmail. 
    > > http://www.hotmail.com
    > > 
    > 
    > -- 
    > Srinivasa Rao Addepalli
    > Intoto Inc.
    > 3160, De La Cruz Blvd #100
    > Santa Clara, CA
    > USA
    > Ph: 408-844-0480 x317
    > 
    


Home

Last updated: Mon May 06 20:18:26 2002
9990 messages in chronological order