|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: iSCSI and secure boot> As iSCSI is transporting SCSI and SCSI has a different boot paradigm than > Netboot can you please elaborate on what exactly should be an authenticated > boot image in this (SCSI) context. > > Please take into consideration that unlike netboot - the SCSI boot is not a > clearly bounded process (not even in PXE - an "open" proprietary scheme). > I'm no PXE expert, but here is my (admittedly limited) understanding of what goes on: 1. Many OEMs ship PXE-enabled PCs, and in most of these PXE cannot be turned off, though it can be set lower in the boot order. In some percentage of machines PXE will even be higher in the boot order than the hard disk (bad idea, for reasons I'll describe). 2. Machine boots and if it reaches PXE in the boot order, it sends a DHCPDISCOVER. If responded to with a DHCPOFFER including Option 60 ("PXECLIENT") and TFTP server, it will finish obtaining an address via DHCP and then pull a boot image from the TFTP server. This is typically startrom.com, a 16-bit executable. Note that this is often *not* a full OS image; for example Ghost supports PXE and uses this early load in order to reformat the hard disk and start the download of the new "cloned" disk image. Other PXE supporting-apps may do other things with this early boot image. 3. If the machine is PXE 2.0 enabled, it will support signed boot images, and will check the integrity of the boot image prior to executing it. This part of the spec is called BIS -- and requires the public key of the boot image signer to be pre-loaded on the PC. My understanding is that PXE 2.0 and BIS are not widely implemented and as a result, PXE 1.0 systems are most widespread and they execute whatever boot image they are fed. This is one reason why putting PXE high in the boot order is a bad idea. This would enable a rogue ghost server to reformat your hard drive. Ouch! (this happens in real life, unfortunately). 4. PXE 2.0 does not support authenticated DHCP nor any TFTP security, so that it is vulnerable to rogue DHCP servers, offers no support for client authentication, and only checks the integrity of the boot image once it has completed the download of it. However, since it also requires pre-loading the boot image signing cert on the PC, and doesn't support revocation of invalidated boot images (which can be endlessly replayed), in practice PXE 2.0 is not widely deployed and doesn't do a good job in boot image validation. 5. The small startrom.com loader is then used to pull down a more complete OS image, either installing it on the hard drive, or pulling it into memory. At this point, for example, you may have the appropriate drivers loaded, be operating in 32-bit mode, etc. As far as how iSCSI fits in to all this, I'd hope you would enlighten me ;) As has been suggested, the iSCSI target address could be obtained via DHCP, and suitable initial iSCSI drivers provided via the initial boot load obtained via TFTP. Given the security headaches inherent in PXE, I am really interested in how all of this could be done in a deployable, secure manner. The picture is somewhat confusing today, and the following questions come to mind: a. What credentials are needed to secure iSCSI boot? 1. Kerberos machine credentials? 2. Identity/shared keys for IPSEC? b. What credentials are needed to secure DHCP? 1. According to -16, you need the authenticated DHCP key (unique per htype/MAC address) 2. According to draft-hornstein-dhc-kerbauth-0x.txt you need Kerb credentials. 3. Do we care? (see below) c. What credentials are needed to verify the boot image? 1. The boot image signing certificate (BIS) 2. Something else? (Shared secret, Kerb credentials?) Storing several identities and credential sets in PC NVRAM is difficult to administer and deploy. It makes sense to boil this mess down to a small list of items. But how? Some thoughts: * Kerberos clients are small, and I am told, romable. Might it not make sense to use Kerberos to secure PXE? Could we kill multiple birds (iSCSI security, 802.1X, NFS, TFTP, boot image security) by doing this? * Do we really need DHCP authentication for secure boot? Interface-specific authentication credentials strike me as painful to maintain, plus it requires substantial administration.
Home Last updated: Tue Sep 04 01:04:35 2001 6315 messages in chronological order |