SORT BY:

LIST ORDER
THREAD
AUTHOR
SUBJECT


SEARCH

IPS HOME


    [Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

    RE: iSCSI - Change - Login/Text commands with the binary stage code



    Julian, Sandeep,
    
    I am very much in favour of the option A (Always send the names
    in the login command).
    
    This is inline with what we proposed in the Matthew/Bob/Marj
    login proposal and as Sandeep has pointed out it does simplify
    the protocol enormously.
    
    Cheers
    
    Matthew Burbridge
    
    -----Original Message-----
    From: Sandeep Joshi [mailto:sandeepj@research.bell-labs.com]
    Sent: Thursday, August 30, 2001 5:12 PM
    To: ips@ece.cmu.edu
    Subject: Re: iSCSI - Change - Login/Text commands with the binary stage
    code
    
    
    
    Julian,
    
    > > As for the names - I though that security people might object having the
    > > name in clear if the security phase does not make use of the name.
    > > Otherwise we can mandate them on the login but I wonder if that is a
    real
    > > improvement or we are getting carelles.
    > >
    > > Julo
    
    The problem with these names (and hence the request from Steve and
    others 
    earlier) is that it is not possible to know when the target wants them. 
    
    Consider the following excerpts from your latest login proposal..
    
    > A target MAY use the iSCSI Initiator Name as part of its access control
    > mechanism; therefore, the iSCSI Initiator Name MUST be sent before the
    > target is required to disclose its LUs.
    
    The above is _very_ confusing..how can the initiator know if the
     the target is doing access control ?
    
    > If the iSCSI Target Name and/or iSCSI Initiator Name is going to be used
    > in determining the security mode or it is implicit part of
    > authentication, then the iSCSI Target Name and/or iSCSI Initiator Name
    > MUST be sent in the login command for the first connection of a session
    > to identify the storage endpoint of the session
    
    In both the above cases, how does the initiator know when the target
    requires these names?  The partial login response occurs *only* once.
    So when going from the security->operational phase, there is no
    indication that the target would like these names sent.
    
    There are 3 options here :
    (A) ALways send the names in the login command.  Simplify target
       and initiator and eliminate a few of those partial login 
       response codes.
    (B) Maintain a configuration database (per-target) of when names
       must be sent - adds an administration burden.  
    (C) Change the wire protocol to allow the target to indicate when
       the names must be sent - again more complications. 
    
    To round up, I prefer Option (A).  These are just names and not
    passwords, so the security risks are minimal.  Are we trying to 
    protect against traffic analysis ?
    
    -Sandeep
    
    > >
    > > Steve Senum <ssenum@cisco.com>@ece.cmu.edu on 29-08-2001 23:59:36
    > >
    > > Please respond to Steve Senum <ssenum@cisco.com>
    > >
    > > Sent by:  owner-ips@ece.cmu.edu
    > >
    > >
    > > To:   ietf-ips <ips@ece.cmu.edu>
    > > cc:
    > > Subject:  Re: iSCSI - Change - Login/Text commands with the binary stage
    > >       code
    > >
    > >
    > >
    > > Julian,
    > >
    > > A couple of ideas from Matthew Burbridge & Co.'s
    > > login proposal that has generated some interest here:
    > >
    > > 1. Removal of partial login response.  Is it still needed?
    > >
    > > 2. Requiring Initiator and (if not a discovery session)
    > >    Target names on login command, so they are always
    > >    available if needed by the initial phase.
    > >
    > > Comments?
    > >
    > > Regards,
    > > Steve Senum
    > >
    > >
    > >
    > >
    


Home

Last updated: Tue Sep 04 01:03:50 2001
6315 messages in chronological order