SORT BY:

LIST ORDER
THREAD
AUTHOR
SUBJECT


SEARCH

IPS HOME


    [Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

    RE: iSCSI gateways, proxies, etc.



    David,
    
    <Snip...snip>
    >>From a protocol specification viewpoint, out-of-band
    >configuration mechanisms are both more flexible and
    >easier to deal with.  Flexibility comes from the
    >variety of possible mechanisms, for example: 
    
    I do not understand what is meant by "out-of-band".  Is it some
    kind of manual configuration?  That would be a nightmare
    for network administrators.  Traversing firewalls is an
    issue that consumes SOOOO much of their effort.  Perhaps I
    can clarify this issue by giving an overview on the state of
    firewall technology, and show how it applies to iSCSI.
    
    1)  Stateful Inspection
    Generally pioneered by Checkpoint Software.  NAT is optional.
    Internal hosts are allowed to directly resolve DNS queries for
    the entire Internet.  Internal hosts are allowed to initiate TCP
    connections to external hosts, so only a single TCP connection
    is needed for outbound connections.  External hosts must address
    a proxy in order to communicate with an internal host, so at
    least two connections are needed--the first from initiator to
    proxy, the second from proxy to target.  The proxy must obtain
    the IP address of the internal destination somehow and typically
    uses the fully qualified domain name to resolve the internal IP
    address by consulting an internal DNS server.  If this information
    is not in the application protocol, then it may be included in a
    shim such as a SOCKS shim (see RFC 1928).  If iSCSI does not include
    DNS domain name in the transport, then iSCSI must be prepared to
    be "socksified" in order to traverse a firewall from the external
    to internal.  Perhaps this is what is meant by "out-of-band"
    configuration.
    
    2)  Application Proxy Firewall
    Gauntlet, Axent, and others.  Declining in popularity, but there
    are still some out there. Requires internal hosts to connect to
    the proxy firewall before connecting to external hosts.  Worst case,
    a minimum of two TCP connections are needed for both outbound and
    inbound connections, but more recently, these firewalls can operate
    in modes which are more similar to 1) above, allowing internal hosts
    to directly communicate with external hosts.  If the application
    does not include the fully qualified domain name in the transport,
    then it must either be "socksified", or undergo a manual two-step
    process of the user first manually logging in and authenticating
    with the proxy, and then use the application hosted on the proxy to
    complete the connection.
    
    <snip..snip>
    >[A] A NAT monitors DNS traffic to/from a DNS server in
    >private address space behind the NAT.  When a DNS reply
    >containing a translation is intercepted, the NAT sets up
    >an external IP address that maps to the internal IP address
    >in the DNS reply, and substitutes that external IP address
    >for the internal IP address before forwarding the reply
    >(in addition to the usual translation operations performed
    >on the header).  Credit/apologies to whomever (Joshua Tseng?)
    >originally described this example.
    
    I'm afraid I don't quite follow this.  NAT is Network
    Address Translation, and is not an entity on the network.
    Perhaps you're refering to the proxy.  Note that a fully
    qualified domain name may resolve to a different IP address
    outside the firewall than it would inside the firewall.
    Outside the firewall, it resolves to the proxy.  Inside the
    firewall, it resolves to the real destination IP address
    (or even another proxy's address), which must be kept hidden
    from the Public Internet.  The proxy sits on the boundary
    between private and public, and has access to both internal
    and external DNS servers and IP addresses.
    
    >(1) Rely on out-of-band gateway/proxy configuration.
    >(2) Reference T10's 3rd party naming formats for target naming.
    >	This WG would still define an iSCSI 3rd party naming format
    >	and recommend it to T10, and could define ways of using
    >	T10 naming formats with Internet protocols (e.g., LDAP).
    >(3) Invent new ways of naming targets.
    
    Once again, I am unclear as to what is meant by (1)"out-of-band",
    but if it involves manual configuration of proxies, including
    entering which IP addresses translate to what, etc..., then 
    iSCSI will become a true enemy of network administrators
    everywhere.  This is a real heartache and resource sink for
    already-overburdened network admins.
    
    Regarding (2), I would support use of World Wide Port Name (WWPN)
    for target naming, including 3rd party naming.
    
    I hope this helps.
    
    Josh
    
    -----Original Message-----
    From: Black_David@emc.com [mailto:Black_David@emc.com]
    Sent: Wednesday, October 11, 2000 11:18 AM
    To: ips@ece.cmu.edu
    Subject: iSCSI gateways, proxies, etc.
    
    
    Folks,
    
    We've been going around on the topic of these for
    a while without much visible progress.  I'd like
    to suggest a means to extricate ourselves from this
    situation.
    
    Jim Hafner correctly observed that there is a
    fundamental difference between:
    - A gateway that always exposes TCP/IP addresses for the
    	iSCSI targets behind it, and
    - A gateway that must be dynamically configured to
    	obtain connectivity to the iSCSI targets behind it.
    We don't need to do anything to support the first class
    of gateway.  For the second class, there's another
    crucial distinction in the second category, namely
    between in-band and out-of-band configuration mechanisms.
    
    >From a protocol specification viewpoint, out-of-band
    configuration mechanisms are both more flexible and
    easier to deal with.  Flexibility comes from the
    variety of possible mechanisms, for example: 
    
    [A] A NAT monitors DNS traffic to/from a DNS server in
    private address space behind the NAT.  When a DNS reply
    containing a translation is intercepted, the NAT sets up
    an external IP address that maps to the internal IP address
    in the DNS reply, and substitutes that external IP address
    for the internal IP address before forwarding the reply
    (in addition to the usual translation operations performed
    on the header).  Credit/apologies to whomever (Joshua Tseng?)
    originally described this example.
    
    [B] An encrypting firewall does not provide connectivity
    to hosts behind the firewall for general traffic outside
    the firewall.  If an encrypted IPsec tunnel is set up in
    accordance with the firewall's policies, then connectivity
    to some of the hosts behind the firewall is provided for
    traffic using the tunnel in accordance with the firewall's
    policies.
    
    Note that both the NAT and the firewall have to be configured
    by some means, and that both of these mechanisms work without
    any changes to the iSCSI protocol, as both the DNS lookup and
    IPsec tunnel setup happen before the first iSCSI packet is sent.
    The fact that we don't have to specify anything makes these
    easier to deal with, and gives iSCSI compatibility with all sorts
    of things we haven't thought of (yet).
    
    Both the current URL mechanism and the discussion of the
    CONNECT message are in-band configuration mechanisms.  In the
    context of proxy configuration (Julian's concern about views
    is a different, but related issue), this has been turning
    into a tarpit on the list.  From what I can see, the issues
    here are similar to the issues in naming for 3rd party
    commands, something that is not in particularly good shape,
    despite T10's best efforts. I find it hard to believe that
    people want to repeat T10's experience with this from scratch
    for iSCSI, but ... I see three possible paths forward
    from which the WG needs to choose:
    
    (1) Rely on out-of-band gateway/proxy configuration.
    (2) Reference T10's 3rd party naming formats for target naming.
    	This WG would still define an iSCSI 3rd party naming format
    	and recommend it to T10, and could define ways of using
    	T10 naming formats with Internet protocols (e.g., LDAP).
    (3) Invent new ways of naming targets.
    
    I'm inclined to dismiss (3) as being out-of-scope, because
    if this really is analogous to 3rd party naming, then it needs
    to be left to T10 and iSCSI should follow what T10 adopts, BUT
    I'm willing to listen to counter-arguments.
    
    (1) and (2) are complementary rather than exclusive, but the
    protocol gets simpler if we don't have to do (2).  The 3rd party
    naming recommendations to T10 are needed regardless.
    
    Ok - comments are solicited, as I do intend to try to call
    consensus on this set of issues to make progress.
    
    Thanks,
    --David
    
    ---------------------------------------------------
    David L. Black, Senior Technologist
    EMC Corporation, 42 South St., Hopkinton, MA  01748
    +1 (508) 435-1000 x75140     FAX: +1 (508) 497-8500
    black_david@emc.com       Mobile: +1 (978) 394-7754
    ---------------------------------------------------
    


Home

Last updated: Tue Sep 04 01:06:42 2001
6315 messages in chronological order