diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc3347.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc3347.txt')
-rw-r--r-- | doc/rfc/rfc3347.txt | 1459 |
1 files changed, 1459 insertions, 0 deletions
diff --git a/doc/rfc/rfc3347.txt b/doc/rfc/rfc3347.txt new file mode 100644 index 0000000..cdf46d0 --- /dev/null +++ b/doc/rfc/rfc3347.txt @@ -0,0 +1,1459 @@ + + + + + + +Network Working Group M. Krueger +Request for Comments: 3347 R. Haagens +Category: Informational Hewlett-Packard Corporation + C. Sapuntzakis + Stanford + M. Bakke + Cisco Systems + July 2002 + + + Small Computer Systems Interface protocol over the Internet (iSCSI) + Requirements and Design Considerations + +Status of this Memo + + This memo provides information for the Internet community. It does + not specify an Internet standard of any kind. Distribution of this + memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2002). All Rights Reserved. + +Abstract + + This document specifies the requirements iSCSI and its related + infrastructure should satisfy and the design considerations guiding + the iSCSI protocol development efforts. In the interest of timely + adoption of the iSCSI protocol, the IPS group has chosen to focus the + first version of the protocol to work with the existing SCSI + architecture and commands, and the existing TCP/IP transport layer. + Both these protocols are widely-deployed and well-understood. The + thought is that using these mature protocols will entail a minimum of + new invention, the most rapid possible adoption, and the greatest + compatibility with Internet architecture, protocols, and equipment. + +Conventions used in this document + + This document describes the requirements for a protocol design, but + does not define a protocol standard. Nevertheless, the key words + "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", + "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document + are to be interpreted as described in RFC-2119 [2]. + + + + + + + + +Krueger, et al. Informational [Page 1] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + +Table of Contents + + 1. Introduction.................................................2 + 2. Summary of Requirements......................................3 + 3. iSCSI Design Considerations..................................7 + 3.1. General Discussion...........................................7 + 3.2. Performance/Cost.............................................9 + 3.3. Framing.....................................................11 + 3.4. High bandwidth, bandwidth aggregation.......................13 + 4. Ease of implementation/complexity of protocol...............14 + 5. Reliability and Availability................................15 + 5.1. Detection of Data Corruption................................15 + 5.2. Recovery....................................................15 + 6. Interoperability............................................16 + 6.1. Internet infrastructure.....................................16 + 6.2. SCSI........................................................16 + 7. Security Considerations.....................................18 + 7.1. Extensible Security.........................................18 + 7.2. Authentication..............................................18 + 7.3. Data Integrity..............................................19 + 7.4. Data Confidentiality........................................19 + 8. Management..................................................19 + 8.1. Naming......................................................20 + 8.2. Discovery...................................................21 + 9. Internet Accessibility......................................21 + 9.1. Denial of Service...........................................21 + 9.2. NATs, Firewalls and Proxy servers...........................22 + 9.3. Congestion Control and Transport Selection..................22 + 10. Definitions.................................................22 + 11. References..................................................23 + 12. Acknowledgements............................................24 + 13. Author's Addresses..........................................25 + 14. Full Copyright Statement....................................26 + +1. Introduction + + The IP Storage Working group is chartered with developing + comprehensive technology to transport block storage data over IP + protocols. This effort includes a protocol to transport the Small + Computer Systems Interface (SCSI) protocol over the Internet (iSCSI). + The initial version of the iSCSI protocol will define a mapping of + SCSI transport protocol over TCP/IP so that SCSI storage controllers + (principally disk and tape arrays and libraries) can be attached to + IP networks, notably Gigabit Ethernet (GbE) and 10 Gigabit Ethernet + (10 GbE). + + + + + + +Krueger, et al. Informational [Page 2] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + + The iSCSI protocol is a mapping of SCSI to TCP, and constitutes a + "SCSI transport" as defined by the ANSI T10 document SCSI SAM-2 + document [SAM2, p. 3, "Transport Protocols"]. + +2. Summary of Requirements + + The iSCSI standard: + + From section 3.2 Performance/Cost: + + MUST allow implementations to equal or improve on the current + state of the art for SCSI interconnects. + + MUST enable cost competitive implementations. + + SHOULD minimize control overhead to enable low delay + communications. + + MUST provide high bandwidth and bandwidth aggregation. + + MUST have low host CPU utilizations, equal to or better than + current technology. + + MUST be possible to build I/O adapters that handle the entire SCSI + task. + + SHOULD permit direct data placement architectures. + + MUST NOT impose complex operations on host software. + + MUST provide for full utilization of available link bandwidth. + + MUST allow an implementation to exploit parallelism (multiple + connections) at the device interfaces and within the interconnect + fabric. + + From section 3.4 High Bandwidth/Bandwidth Aggregation: + + MUST operate over a single TCP connection. + + SHOULD support 'connection binding', and it MUST be optional to + implement. + + From section 4 Ease of Implementation/Complexity of Protocol: + + SHOULD keep the protocol simple. + + SHOULD minimize optional features. + + + +Krueger, et al. Informational [Page 3] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + + MUST specify feature negotiation at session establishment (login). + + MUST operate correctly when no optional features are negotiated as + well as when individual option negotions are unsuccessful. + + From section 5.1 Detection of Data Corruption: + + MUST support a data integrity check format for use in digest + generation. + + MAY use separate digest for data and headers. + + iSCSI header format SHOULD be extensible to include other data + integrity digest calculation methods. + + From section 5.2 Recovery: + + MUST specify mechanisms to recover in a timely fashion from + failures on the initiator, target, or connecting infrastructure. + + MUST specify recovery methods for non-idempotent requests. + + SHOULD take into account fail-over schemes for mirrored targets or + highly available storage configurations. + + SHOULD provide a method for sessions to be gracefully terminated + and restarted that can be initiated by either the initiator or + target. + + From section 6 Interoperability: + + iSCSI protocol document MUST be clear and unambiguous. + + From section 6.1 Internet Infrastructure: + + MUST: + -- be compatible with both IPv4 and IPv6 + -- use TCP connections conservatively, keeping in mind there may + be many other users of TCP on a given machine. + + MUST NOT require changes to existing Internet protocols. + + SHOULD minimize required changes to existing TCP/IP + implementations. + + MUST be designed to allow future substitution of SCTP (for TCP) as + an IP transport protocol with minimal changes to iSCSI protocol + operation, protocol data unit (PDU) structures and formats. + + + +Krueger, et al. Informational [Page 4] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + + From section 6.2 SCSI: + + Any feature SAM2 requires in a valid transport mapping MUST be + specified by iSCSI. + + MUST specify strictly ordered delivery of SCSI commands over an + iSCSI session between an initiator/target pair. + + The command ordering mechanism SHOULD seek to minimize the amount + of communication necessary across multiple adapters doing + transport off-load. + + MUST specify for each feature whether it is OPTIONAL, RECOMMENDED + or REQUIRED to implement and/or use. + + MUST NOT require changes to the SCSI-3 command sets and SCSI + client code except except where SCSI specifications point to + "transport dependent" fields and behavior. + + SHOULD track changes to SCSI and the SCSI Architecture Model. + + MUST be capable of supporting all SCSI-3 command sets and device + types. + + SHOULD support ACA implementation. + + MUST allow for the construction of gateways to other SCSI + transports + + MUST reliably transport SCSI commands from the initiator to the + target. + + MUST correctly deal with iSCSI packet drop, duplication, + corruption, stale packets, and re-ordering. + + From section 7.1 Extensible Security: + + SHOULD require minimal configuration and overhead in the insecure + operation. + + MUST provide for strong authentication when increased security is + required. + + SHOULD allow integration of new security mechanisms without + breaking backwards compatible operation. + + + + + + +Krueger, et al. Informational [Page 5] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + + From section 7.2 Authentication: + + MAY support various levels of authentication security. + + MUST support private authenticated login. + + iSCSI authenticated login MUST be resilient against attacks. + + MUST support data origin authentication of its communications; + data origin authentication MAY be optional to use. + + From section 7.3 Data Integrity: + + SHOULD NOT preclude use of additional data integrity protection + protocols (IPSec, TLS). + + From section 7.4 Data Confidentiality: + + MUST provide for the use of a data encryption protocol such as TLS + or IPsec ESP to provide data confidentiality between iSCSI + endpoints + + From section 8 Management: + + SHOULD be manageable using standard IP-based management protocols. + + iSCSI protocol document MUST NOT define the management + architecture for iSCSI, or make explicit references to management + objects such as MIB variables. + + From section 8.1 Naming: + + MUST support the naming architecture of SAM-2. The means by which + an iSCSI resource is located MUST use or extend existing Internet + standard resource location methods. + + MUST provide a means of identifying iSCSI targets by a unique + identifier that is independent of the path on which it is found. + + The format for the iSCSI names MUST use existing naming + authorities. + + An iSCSI name SHOULD be a human readable string in an + international character set encoding. + + Standard Internet lookup services SHOULD be used to resolve iSCSI + names. + + + + +Krueger, et al. Informational [Page 6] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + + SHOULD deal with the complications of the new SCSI security + architecture. + + iSCSI naming architecture MUST address support of SCSI 3rd party + operations such as EXTENDED COPY. + + From section 8.2 Discovery: + + MUST have no impact on the use of current IP network discovery + techniques. + + MUST provide some means of determining whether an iSCSI service is + available through an IP address. + + SCSI protocol-dependent techniques SHOULD be used for further + discovery beyond the iSCSI layer. + + MUST provide a method of discovering, given an IP end point on its + well-known port, the list of SCSI targets available to the + requestor. The use of this discovery service MUST be optional. + + From section 9 Internet Accessability. + + SHOULD be scrutinized for denial of service issues and they should + be addressed. + + From section 9.2 Firewalls and Proxy Servers + + SHOULD allow deployment where functional and optimizing middle- + boxes such as firewalls, proxy servers and NATs are present. + + use of IP addresses and TCP ports SHOULD be firewall friendly. + + From section 9.3 Congestion Control and Transport Selection + + MUST be a good network citizen with TCP-compatible congestion + control (as defined in [RFC2914]). + + iSCSI implementations MUST NOT use multiple connections as a means + to avoid transport-layer congestion control. + +3. iSCSI Design Considerations + +3.1. General Discussion + + Traditionally, storage controllers (e.g., disk array controllers, + tape library controllers) have supported the SCSI-3 protocol and have + been attached to computers by SCSI parallel bus or Fibre Channel. + + + +Krueger, et al. Informational [Page 7] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + + The IP infrastructure offers compelling advantages for volume/ + block-oriented storage attachment. It offers the opportunity to take + advantage of the performance/cost benefits provided by competition in + the Internet marketplace. This could reduce the cost of storage + network infrastructure by providing economies arising from the need + to install and operate only a single type of network. + + In addition, the IP protocol suite offers the opportunity for a rich + array of management, security and QoS solutions. Organizations may + initially choose to operate storage networks based on iSCSI that are + independent of (isolated from) their current data networks except for + secure routing of storage management traffic. These organizations + anticipated benefits from the high performance/cost of IP equipment + and the opportunity for a unified management architecture. As + security and QoS evolve, it becomes reasonable to build combined + networks with shared infrastructure; nevertheless, it is likely that + sophisticated users will choose to keep their storage sub-networks + isolated to afford the best control of security and QoS to ensure a + high-performance environment tuned to storage traffic. + + Mapping SCSI over IP also provides: + + -- Extended distance ranges + -- Connectivity to "carrier class" services that support IP + + The following applications for iSCSI are contemplated: + + -- Local storage access, consolidation, clustering and pooling (as + in the data center) + -- Network client access to remote storage (eg. a "storage service + provider") + -- Local and remote synchronous and asynchronous mirroring between + storage controllers + -- Local and remote backup and recovery + + iSCSI will support the following topologies: + + -- Point-to-point direct connections + -- Dedicated storage LAN, consisting of one or more LAN segments + -- Shared LAN, carrying a mix of traditional LAN traffic plus + storage traffic + -- LAN-to-WAN extension using IP routers or carrier-provided "IP + Datatone" + -- Private networks and the public Internet + + IP LAN-WAN routers may be used to extend the IP storage network to + the wide area, permitting remote disk access (as for a storage + utility), synchronous and asynchronous remote mirroring, and remote + + + +Krueger, et al. Informational [Page 8] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + + backup and restore (as for tape vaulting). In the WAN, using TCP + end-to-end avoids the need for specialized equipment for protocol + conversion, ensures data reliability, copes with network congestion, + and provides retransmission strategies adapted to WAN delays. + + The iSCSI technology deployment will involve the following elements: + + (1) Conclusion of a complete protocol standard and supporting + implementations; + (2) Development of Ethernet storage NICs and related driver and + protocol software; [NOTE: high-speed applications of iSCSI are + expected to require significant portions of the iSCSI/TCP/IP + implementation in hardware to achieve the necessary throughput.] + (3) Development of compatible storage controllers; and + (4) The likely development of translating gateways to provide + connectivity between the Ethernet storage network and the Fibre + Channel and/or parallel-bus SCSI domains. + (5) Development of specifications for iSCSI device management such + as MIBs, LDAP or XML schemas, etc. + (6) Development of management and directory service applications to + support a robust SAN infrastructure. + + Products could initially be offered for Gigabit Ethernet attachment, + with rapid migration to 10 GbE. For performance competitive with + alternative SCSI transports, it will be necessary to implement the + performance path of the full protocol stack in hardware. These new + storage NICs might perform full-stack processing of a complete SCSI + task, analogous to today's SCSI and Fibre Channel HBAs, and might + also support all host protocols that use TCP (NFS, CIFS, HTTP, etc). + + The charter of the IETF IP Storage Working Group (IPSWG) describes + the broad goal of mapping SCSI to IP using a transport that has + proven congestion avoidance behavior and broad implementation on a + variety of platforms. Within that broad charter, several transport + alternatives may be considered. Initial IPS work focuses on TCP, and + this requirements document is restricted to that domain of interest. + +3.2. Performance/Cost + + In general, iSCSI MUST allow implementations to equal or improve on + the current state of the art for SCSI interconnects. This goal + breaks down into several types of requirement: + + Cost competitive with alternative storage network technologies: + + In order to be adopted by vendors and the user community, the iSCSI + protocol MUST enable cost competitive implementations when compared + to other SCSI transports (Fibre Channel). + + + +Krueger, et al. Informational [Page 9] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + + Low delay communication: + + Conventional storage access is of a stop-and-wait remote procedure + call type. Applications typically employ very little pipelining of + their storage accesses, and so storage access delay directly impacts + performance. The delay imposed by current storage interconnects, + including protocol processing, is generally in the range of 100 + microseconds. The use of caching in storage controllers means that + many storage accesses complete almost instantly, and so the delay of + the interconnect can have a high relative impact on overall + performance. When stop-and-wait IO is used, the delay of the + interconnect will affect performance. The iSCSI protocol SHOULD + minimize control overhead, which adds to delay. + + Low host CPU utilization, equal to or better than current technology: + + For competitive performance, the iSCSI protocol MUST allow three key + implementation goals to be realized: + + (1) iSCSI MUST make it possible to build I/O adapters that handle an + entire SCSI task, as alternative SCSI transport implementations + do. + (2) The protocol SHOULD permit direct data placement ("zero-copy" + memory architectures, where the I/O adapter reads or writes host + memory exactly once per disk transaction. + (3) The protocol SHOULD NOT impose complex operations on the host + software, which would increase host instruction path length + relative to alternatives. + + Direct data placement (zero-copy iSCSI): + + Direct data placement refers to iSCSI data being placed directly "off + the wire" into the allocated location in memory with no intermediate + copies. Direct data placement significantly reduces the memory bus + and I/O bus loading in the endpoint systems, allowing improved + performance. It reduces the memory required for NICs, possibly + reducing the cost of these solutions. + + This is an important implementation goal. In an iSCSI system, each + of the end nodes (for example host computer and storage controller) + should have ample memory, but the intervening nodes (NIC, switches) + typically will not. + + + + + + + + + +Krueger, et al. Informational [Page 10] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + + High bandwidth, bandwidth aggregation: + + The bandwidth (transfer rate, MB/sec) supported by storage + controllers is rapidly increasing, due to several factors: + + 1. Increase in disk spindle and controller performance; + 2. Use of ever-larger caches, and improved caching algorithms; + 3. Increased scale of storage controllers (number of supported + spindles, speed of interconnects). + + The iSCSI protocol MUST provide for full utilization of available + link bandwidth. The protocol MUST also allow an implementation to + exploit parallelism (multiple connections) at the device interfaces + and within the interconnect fabric. + + The next two sections further discuss the need for direct data + placement and high bandwidth. + +3.3. Framing + + Framing refers to the addition of information in a header, or the + data stream to allow implementations to locate the boundaries of an + iSCSI protocol data unit (PDU) within the TCP byte stream. There are + two technical requirements driving framing: interfacing needs, and + accelerated processing needs. + + A framing solution that addresses the "interfacing needs" of the + iSCSI protocol will facilitate the implementation of a message-based + upper layer protocol (iSCSI) on top of an underlying byte streaming + protocol (TCP). Since TCP is a reliable transport, this can be + accomplished by including a length field in the iSCSI header. Finding + the protocol frame assumes that the receiver will parse from the + beginning of the TCP data stream, and never make a mistake (lose + alignment on packet headers). + + The other technical requirement for framing, "accelerated + processing", stems from the need to handle increasingly higher data + rates in the physical media interface. Two needs arise from higher + data rates: + + (1) LAN environment - NIC vendors seek ways to provide "zero-copy" + methods of moving data directly from the wire into application + buffers. + + (2) WAN environment- the emergence of high bandwidth, high latency, + low bit error rate physical media places huge buffer + requirements on the physical interface solutions. + + + + +Krueger, et al. Informational [Page 11] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + + First, vendors are producing network processing hardware that + offloads network protocols to hardware solutions to achieve higher + data rates. The concept of "zero-copy" seeks to store blocks of data + in appropriate memory locations (aligned) directly off the wire, even + when data is reordered due to packet loss. This is necessary to + drive actual data rates of 10 Gigabit/sec and beyond. + + Secondly, in order for iSCSI to be successful in the WAN arena it + must be possible to operate efficiently in high bandwidth, high delay + networks. The emergence of multi-gigabit IP networks with latencies + in the tens to hundreds of milliseconds presents a challenge. To + fill such large pipes, it is necessary to have tens of megabytes of + outstanding requests from the application. In addition, some + protocols potentially require tens of megabytes at the transport + layer to deal with buffering for reassembly of data when packets are + received out-of-order. + + In both cases, the issue is the desire to minimize the amount of + memory and memory bandwidth required for iSCSI hardware solutions. + + Consider that a network pipe at 10 Gbps x 200 msec holds 250 MB. + [Assume land-based communication with a spot half way around the + world at the equator. Ignore additional distance due to cable + routing. Ignore repeater and switching delays; consider only a + speed-of-light delay of 5 microsec/km. The circumference of the + globe at the equator is approx. 40000 km (round-trip delay must be + considered to keep the pipe full). 10 Gb/sec x 40000 km x 5 + microsec/km x B / 8b = 250 MB]. In a conventional TCP + implementation, loss of a TCP segment means that stream processing + MUST stop until that segment is recovered, which takes at least a + time of <network round trip> to accomplish. Following the example + above, an implementation would be obliged to catch 250 MB of data + into an anonymous buffer before resuming stream processing; later, + this data would need to be moved to its proper location. Some + proponents of iSCSI seek some means of putting data directly where it + belongs, and avoiding extra data movement in the case of segment + drop. This is a key concept in understanding the debate behind + framing methodologies. + + The framing of the iSCSI protocol impacts both the "interfacing + needs" and the "accelerated processing needs", however, while + including a length in a header may suffice for the "interfacing + needs", it will not serve the direct data placement needs. The + framing mechanism developed should allow resynchronization of packet + boundaries even in the case where a packet is temporarily missing in + the incoming data stream. + + + + + +Krueger, et al. Informational [Page 12] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + +3.4. High bandwidth, bandwidth aggregation + + At today's block storage transport throughput, any single link can be + saturated by the volume of storage traffic. Scientific data + applications and data replication are examples of storage + applications that push the limits of throughput. + + Some applications, such as log updates, streaming tape, and + replication, require ordering of updates and thus ordering of SCSI + commands. An initiator may maintain ordering by waiting for each + update to complete before issuing the next (a.k.a. synchronous + updates). However, the throughput of synchronous updates decreases + inversely with increases in network distances. + + For greater throughput, the SCSI task queuing mechanism allows an + initiator to have multiple commands outstanding at the target + simultaneously and to express ordering constraints on the execution + of those commands. The task queuing mechanism is only effective if + the commands arrive at the target in the order they were presented to + the initiator (FIFO order). The iSCSI standard must provide an + ordered transport of SCSI commands, even when commands are sent along + different network paths (see Section 5.2 SCSI). This is referred to + as "command ordering". + + The iSCSI protocol MUST operate over a single TCP connection to + accommodate lower cost implementations. To enable higher performance + storage devices, the protocol should specify a means to allow + operation over multiple connections while maintaining the behavior of + a single SCSI port. This would allow the initiator and target to use + multiple network interfaces and multiple paths through the network + for increased throughput. There are a few potential ways to satisfy + the multiple path and ordering requirements. + + A popular way to satisfy the multiple-path requirement is to have a + driver above the SCSI layer instantiate multiple copies of the SCSI + transport, each communicating to the target along a different path. + "Wedge" drivers use this technique today to attain high performance. + Unfortunately, wedge drivers must wait for acknowledgement of + completion of each request (stop-and-wait) to ensure ordered updates. + + Another approach might be for iSCSI protocol to use multiple + instances of its underlying transport (e.g. TCP). The iSCSI layer + would make these independent transport instances appear as one SCSI + transport instance and maintain the ability to do ordered SCSI + command queuing. The document will refer to this technique as + "connection binding" for convenience. + + + + + +Krueger, et al. Informational [Page 13] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + + The iSCSI protocol SHOULD support connection binding, and it MUST be + optional to implement. + + In the presence of connection binding, there are two ways to assign + features to connections. In the symmetric approach, all the + connections are identical from a feature standpoint. In the + asymmetric model, connections have different features. For example, + some connections may be used primarily for data transfers whereas + others are used primarily for SCSI commands. + + Since the iSCSI protocol must support the case where there was only + one transport connection, the protocol must have command, data, and + status travel over the same connection. + + In the case of multiple connections, the iSCSI protocol must keep the + command and its associated data and status on the same connection + (connection allegiance). Sending data and status on the same + connection is desirable because this guarantees that status is + received after the data (TCP provides ordered delivery). In the case + where each connection is managed by a separate processor, allegiance + decreases the need for inter-processor communication. This symmetric + approach is a natural extension of the single connection approach. + + An alternate approach that was extensively discussed involved sending + all commands on a single connection and the associated data and + status on a different connection (asymmetric approach). In this + scheme, the transport ensures the commands arrive in order. The + protocol on the data and status connections is simpler, perhaps + lending itself to a simpler realization in hardware. One + disadvantage of this approach is that the recovery procedure is + different if a command connection fails vs. a data connection. Some + argued that this approach would require greater inter-processor + communication when connections are spread across processors. + + The reader may reference the mail archives of the IPS mailing list + between June and September of 2000 for extensive discussions on + symmetric vs asymmetric connection models. + +4. Ease of implementation/complexity of protocol + + Experience has shown that adoption of a protocol by the Internet + community is inversely proportional to its complexity. In addition, + the simpler the protocol, the easier it is to diagnose problems. The + designers of iSCSI SHOULD strive to fulfill the requirements of the + creating a SCSI transport over IP, while keeping the protocol as + simple as possible. + + + + + +Krueger, et al. Informational [Page 14] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + + In the interest of simplicity, iSCSI SHOULD minimize optional + features. When features are deemed necessary, the protocol MUST + specify feature negotiation at session establishment (login). The + iSCSI transport MUST operate correctly when no optional features are + negotiated as well as when individual option negotiations are + unsuccessful. + +5. Reliability and Availability + +5.1. Detection of Data Corruption + + There have been several research papers that suggest that the TCP + checksum calculation allows a certain number of bit errors to pass + undetected [10] [11]. + + In order to protect against data corruption, the iSCSI protocol MUST + support a data integrity check format for use in digest generation. + + The iSCSI protocol MAY use separate digests for data and headers. In + an iSCSI proxy or gateway situation, the iSCSI headers are removed + and re-built, and the TCP stream is terminated on either side. This + means that even the TCP checksum is removed and recomputed within the + gateway. To ensure the protection of commands, data, and status the + iSCSI protocol MUST include a CRC or other digest mechanism that is + computed on the SCSI data block itself, as well as on each command + and status message. Since gateways may strip iSCSI headers and + rebuild them, a separate header CRC is required. Two header digests, + one for invariant portions of the header (addresses) and one for the + variant portion would provide protection against changes to portions + of the header that should never be changed by middle boxes (eg, + addresses). + + The iSCSI header format SHOULD be extensible to include other digest + calculation methods. + +5.2. Recovery + + The SCSI protocol was originally designed for a parallel bus + transport that was highly reliable. SCSI applications tend to assume + that transport errors never happen, and when they do, SCSI + application recovery tends to be expensive in terms of time and + computational resources. + + iSCSI protocol design, while placing an emphasis on simplicity, MUST + lead to timely recovery from failure of initiator, target, or + connecting network infrastructure (cabling, data path equipment such + as routers, etc). + + + + +Krueger, et al. Informational [Page 15] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + + iSCSI MUST specify recovery methods for non-idempotent requests, such + as operations on tape drives. + + The iSCSI protocol error recover mechanism SHOULD take into account + fail-over schemes for mirrored targets or highly available storage + configurations that provide paths to target data through multiple + "storage servers". This would provide a basis for layered + technologies like high availability and clustering. + + The iSCSI protocol SHOULD also provide a method for sessions to be + gracefully terminated and restarted that can be initiated by either + the initiator or target. This provides the ability to gracefully + fail over an initiator or target, or reset a target after performing + maintenance tasks such as upgrading software. + +6. Interoperability + + It must be possible for initiators and targets that implement the + required portions of the iSCSI specification to interoperate. While + this requirement is so obvious that it doesn't seem worth mentioning, + if the protocol specification contains ambiguous wording, different + implementations may not interoperate. The iSCSI protocol document + MUST be clear and unambiguous. + +6.1. Internet infrastructure + + The iSCSI protocol MUST: + + -- be compatible with both IPv4 and IPv6. + -- use TCP connections conservatively, keeping in mind there may + be many other users of TCP on a given machine. + + The iSCSI protocol MUST NOT require changes to existing Internet + protocols and SHOULD minimize required changes to existing TCP/IP + implementations. + + iSCSI MUST be designed to allow future substitution of SCTP (for TCP) + as an IP transport protocol with minimal changes to iSCSI protocol + operation, protocol data unit (PDU) structures and formats. Although + not widely implemented today, SCTP has many design features that make + it a desirable choice for future iSCSI enhancement. + +6.2. SCSI + + In order to be considered a SCSI transport, the iSCSI standard must + comply with the requirements of the SCSI Architecture Model [SAM-2] + for a SCSI transport. Any feature SAM2 requires in a valid transport + mapping MUST be specified by iSCSI. The iSCSI protocol document MUST + + + +Krueger, et al. Informational [Page 16] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + + specify for each feature whether it is OPTIONAL, RECOMMENDED or + REQUIRED to implement and/or use. + + The SCSI Architectural Model [SAM-2] indicates an expectation that + the SCSI transport provides ordering of commands on an initiator + target-LUN granularity. There has been much discussion on the IPS + reflector and in working group meetings regarding the means to ensure + this ordering. The rough consensus is that iSCSI MUST specify + strictly ordered delivery of SCSI commands over an iSCSI session + between an initiator/target pair, even in the presence of transport + errors. This command ordering mechanism SHOULD seek to minimize the + amount of communication necessary across multiple adapters doing + transport off-load. If an iSCSI implementation does not require + ordering it can instantiate multiple sessions per initiator-target + pair. + + iSCSI is intended to be a new SCSI "transport" [SAM2]. As a mapping + of SCSI over TCP, iSCSI requires interaction with both T10 and IETF. + However, the iSCSI protocol MUST NOT require changes to the SCSI-3 + command sets and SCSI client code except where SCSI specifications + point to "transport dependent" fields and behavior. For example, + changes to SCSI documents will be necessary to reflect lengthier + iSCSI target names and potentially lengthier timeouts. Collaboration + with T10 will be necessary to achieve this requirement. + + The iSCSI protocol SHOULD track changes to SCSI and the SCSI + Architecture Model. + + The iSCSI protocol MUST be capable of supporting all SCSI-3 command + sets and device types. The primary focus is on supporting 'larger' + devices: host computers and storage controllers (disk arrays, tape + libraries). However, other command sets (printers, scanners) must be + supported. These requirements MUST NOT be construed to mean that + iSCSI must be natively implementable on all of today's SCSI devices, + which might have limited processing power or memory. + + ACA (Auto Contingent Allegiance) is an optional SCSI mechanism that + stops execution of a sequence of dependent SCSI commands when one of + them fails. The situation surrounding it is complex - T10 specifies + ACA in SAM2, and hence iSCSI must support it and endeavor to make + sure that ACA gets implemented sufficiently (two independent + interoperable implementations) to avoid dropping ACA in the + transition from Proposed Standard to Draft Standard. This implies + iSCSI SHOULD support ACA implementation. + + The iSCSI protocol MUST allow for the construction of gateways to + other SCSI transports, including parallel SCSI [SPI-X] and to SCSI + FCP[FCP, FCP-2]. It MUST be possible to construct "translating" + + + +Krueger, et al. Informational [Page 17] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + + gateways so that iSCSI hosts can interoperate with SCSI-X devices; so + that SCSI-X devices can communicate over an iSCSI network; and so + that SCSI-X hosts can use iSCSI targets (where SCSI-X refers to + parallel SCSI, SCSI-FCP, or SCSI over any other transport). This + requirement is implied by support for SAM-2, but is worthy of + emphasis. These are true application protocol gateways, and not just + bridge/routers. The different standards have only the SCSI-3 command + set layer in common. These gateways are not mere packet forwarders. + + The iSCSI protocol MUST reliably transport SCSI commands from the + initiator to the target. According to [SAM-2, p. 17.] "The function + of the service delivery subsystem is to transport an error-free copy + of the request or response between the sender and the receiver" + [SAM-2, p. 22]. The iSCSI protocol MUST correctly deal with iSCSI + packet drop, duplication, corruption, stale packets, and re-ordering. + +7. Security Considerations + + In the past, directly attached storage systems have implemented + minimal security checks because the physical connection offered + little chance for attack. Transporting block storage (SCSI) over IP + opens a whole new opportunity for a variety of malicious attacks. + Attacks can take the active form (identity spoofing, man-in-the- + middle) or the passive form (eavesdropping). + +7.1. Extensible Security + + The security services required for communications depends on the + individual network configurations and environments. Organizations + are setting up Virtual Private Networks(VPN), also known as + Intranets, that will require one set of security functions for + communications within the VPN and possibly many different security + functions for communications outside the VPN to support + geographically separate components. The iSCSI protocol is applicable + to a wide range of internet working environments that may employ + different security policies. iSCSI MUST provide for strong + authentication when increased security is required. The protocol + SHOULD require minimal configuration and overhead in the insecure + operation, and allow integration of new security mechanisms without + breaking backwards compatible operation. + +7.2. Authentication + + The iSCSI protocol MAY support various levels of authentication + security, ranging from no authentication to secure authentication + using public or private keys. + + The iSCSI protocol MUST support private authenticated login. + + + +Krueger, et al. Informational [Page 18] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + + Authenticated login aids the target in blocking the unauthorized use + of SCSI resources. "Private" authenticated login mandates protected + identity exchange (no clear text passwords at a minimum). Since + block storage confidentiality is considered critical in enterprises + and many IP networks may have access holes, organizations will want + to protect their iSCSI resources. + + The iSCSI authenticated login MUST be resilient against attacks since + many IP networks are vulnerable to packet inspection. + + In addition, the iSCSI protocol MUST support data origin + authentication of its communications; data origin authentication MAY + be optional to use. Data origin authentication is critical since IP + networks are vulnerable to source spoofing, where a malicious third + party pretends to send packets from the initiator's IP address. These + requirements should be met using standard Internet protocols such as + IPsec or TLS. The endpoints may negotiate the authentication method, + optionally none. + +7.3. Data Integrity + + The iSCSI protocol SHOULD NOT preclude use of additional data + integrity protection protocols (IPSec, TLS). + +7.4. Data Confidentiality + + Block storage is used for storing sensitive information, where data + confidentiality is critical. An application may encrypt the data + blocks before writing them to storage - this provides the best + protection for the application. Even if the storage or + communications are compromised, the attacker will have difficulty + reading the data. + + In certain environments, encryption may be desired to provide an + extra assurance of confidentiality. An iSCSI implementation MUST + provide for the use of a data encryption protocol such as TLS or + IPsec ESP to provide data confidentiality between iSCSI endpoints. + +8. Management + + iSCSI implementations SHOULD be manageable using standard IP-based + management protocols. However, the iSCSI protocol document MUST NOT + define the management architecture for iSCSI within the network + infrastructure. iSCSI will be yet another resource service within a + complex environment of network resources (printers, file servers, + NAS, application servers, etc). There will certainly be efforts to + design how the "block storage service" that iSCSI devices provide is + integrated into a comprehensive, shared model, network management + + + +Krueger, et al. Informational [Page 19] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + + environment. A "network administrator" (or "storage administrator") + will desire to have integrated applications for assigning user names, + resource names, etc. and indicating access rights. iSCSI devices + presumably will want to interact with these integrated network + management applications. The iSCSI protocol document will not + attempt to solve that set of problems, or specify means for devices + to provide management agents. In fact, there should be no mention of + MIBs or any other means of managing iSCSI devices as explicit + references in the iSCSI protocol document, because management data + and protocols change with the needs of the environment and the + business models of the management applications. + +8.1. Naming + + Whenever possible, iSCSI MUST support the naming architecture of + SAM-2. Deviations and uncertainties MUST be made explicit, and + comments and resolutions worked out between ANSI T10 and the IPS + working group. + + The means by which an iSCSI resource is located MUST use or extend + existing Internet standard resource location methods. RFC 2348 [12] + specifies URL syntax and semantics which should be sufficiently + extensible for the iSCSI resource. + + The iSCSI protocol MUST provide a means of identifying an iSCSI + storage device by a unique identifier that is independent of the path + on which it is found. This name will be used to correlate alternate + paths to the same device. The format for the iSCSI names MUST use + existing naming authorities, to avoid creating new central + administrative tasks. An iSCSI name SHOULD be a human readable + string in an international character set encoding. + + Standard Internet lookup services SHOULD be used to resolve names. + For example, Domain Name Services (DNS) MAY be used to resolve the + <hostname> portion of a URL to one or multiple IP addresses. When a + hostname resolves to multiple addresses, these addresses should be + equivalent for functional (possibly not performance) purposes. This + means that the addresses can be used interchangeably as long as + performance isn't a concern. For example, the same set of SCSI + targets MUST be accessible from each of these addresses. + + An iSCSI device naming scheme MUST interact correctly with the + proposed SCSI security architecture [99-245r9]. Particular attention + must be directed to the proxy naming architecture defined by the new + security model. In this new model, a host is identified by an + Access ID, and SCSI Logical Unit Numbers (LUNs) can be mapped in a + manner that gives each AccessID a unique LU map. Thus, a given LU + within a target may be addressed by different LUNs. + + + +Krueger, et al. Informational [Page 20] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + + The iSCSI naming architecture MUST address support of SCSI 3rd party + operations such as EXTENDED COPY. The key issue here relates to the + naming architecture for SCSI LUs - iSCSI must provide a means of + passing a name or handle between parties. iSCSI must specify a means + of providing a name or handle that could be used in the XCOPY command + and fit within the available space allocated by that command. And it + must be possible, of course, for the XCOPY target (the third party) + to de-reference the name to the correct target and LU. + +8.2. Discovery + + iSCSI MUST have no impact on the use of current IP network discovery + techniques. Network management platforms discover IP addresses and + have various methods of probing the services available through these + IP addresses. An iSCSI service should be evident using similar + techniques. + + The iSCSI specifications MUST provide some means of determining + whether an iSCSI service is available through an IP address. It is + expected that iSCSI will be a point of service in a host, just as + SNMP, etc are points of services, associated with a well known port + number. + + SCSI protocol-dependent techniques SHOULD be used for further + discovery beyond the iSCSI layer. Discovery is a complex, multi- + layered process. The SCSI protocol specifications provide specific + commands for discovering LUs and the commands associated with this + process will also work over iSCSI. + + The iSCSI protocol MUST provide a method of discovering, given an IP + end point on its well-known port, the list of SCSI targets available + to the requestor. The use of this discovery service MUST be + optional. + + Further discovery guidelines are outside the scope of this document + and may be addressed in separate Informational documents. + +9. Internet Accessibility + +9.1. Denial of Service + + As with all services, the denial of service by either incorrect + implementations or malicious agents is always a concern. All aspects + of the iSCSI protocol SHOULD be scrutinized for potential denial of + service issues, and guarded against as much as possible. + + + + + + +Krueger, et al. Informational [Page 21] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + +9.2. NATs, Firewalls and Proxy servers + + NATs (Network Address Translator), firewalls, and proxy servers are a + reality in today's Internet. These devices present a number of + challenges to device access methods being developed for iSCSI. For + example, specifying a URL syntax for iSCSI resource connection allows + an initiator to address an iSCSI target device both directly and + through an iSCSI proxy server or NAT. iSCSI SHOULD allow deployment + where functional and optimizing middle-boxes such as firewalls, proxy + servers and NATs are present. + + + The iSCSI protocol's use of IP addressing and TCP port numbers MUST + be firewall friendly. This means that all connection requests should + normally be addressed to a specific, well-known TCP port. That way, + firewalls can filter based on source and destination IP addresses, + and destination (target) port number. Additional TCP connections + would require different source port numbers (for uniqueness), but + could be opened after a security dialogue on the control channel. + + It's important that iSCSI operate through a firewall to provide a + possible means of defending against Denial of Service (DoS) assaults + from less-trusted areas of the network. It is assumed that a + firewall will have much greater processing power for dismissing bogus + connection requests than end nodes. + +9.3. Congestion Control and Transport Selection + + The iSCSI protocol MUST be a good network citizen with proven + congestion control (as defined in [RFC2914]). In addition, iSCSI + implementations MUST NOT use multiple connections as a means to avoid + transport-layer congestion control. + +10. Definitions + + Certain definitions are offered here, with references to the original + document where applicable, in order to clarify the discussion of + requirements. Definitions without references are the work of the + authors and reviewers of this document. + + Logical Unit (LU): A target-resident entity that implements a device + model and executes SCSI commands sent by an application client [SAM- + 2, sec. 3.1.50, p. 7]. + + Logical Unit Number (LUN): A 64-bit identifier for a logical unit + [SAM-2, sec. 3.1.52, p. 7]. + + + + + +Krueger, et al. Informational [Page 22] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + + SCSI Device: A device that is connected to a service delivery + subsystem and supports a SCSI application protocol [SAM-2, sec. + 3.1.78, p. 9]. + + Service Delivery Port (SDP): A device-resident interface used by the + application client, device server, or task manager to enter and + retrieve requests and responses from the service delivery subsystem. + Synonymous with port (SAM-2 sec. 3.1.61) [SAM-2, sec. 3.1.89, p. 9]. + + Target: A SCSI device that receives a SCSI command and directs it to + one or more logical units for execution [SAM-2 sec. 3.1.97, p. 10]. + + Task: An object within the logical unit representing the work + associated with a command or a group of linked commands [SAM-2, sec. + 3.1.98, p. 10]. + + Transaction: A cooperative interaction between two objects, involving + the exchange of information or the execution of some service by one + object on behalf of the other [SAM-2, sec. 3.1.109, p. 10]. + +11. References + + 1. Bradner, S., "The Internet Standards Process -- Revision 3", BCP + 9, RFC 2026, October 1996. + + 2. Bradner, S., "Key words for use in RFCs to Indicate Requirement + Levels", BCP 14, RFC 2119, March 1997. + + 3. [SAM-2] ANSI NCITS. Weber, Ralph O., editor. SCSI Architecture + Model -2 (SAM-2). T10 Project 1157-D. rev 23, 16 Mar 2002. + + 4. [SPC-2] ANSI NCITS. Weber, Ralph O., editor. SCSI Primary + Commands 2 (SPC-2). T10 Project 1236-D. rev 20, 18 July + 2001. + + 5. [CAM-3] ANSI NCITS. Dallas, William D., editor. Information + Technology - Common Access Method - 3 (CAM-3)). X3T10 Project + 990D. rev 3, 16 Mar 1998. + + 6. [99-245r8] Hafner, Jim. A Detailed Proposal for Access + Controls. T10/99-245 revision 9, 26 Apr 2000. + + 7. [SPI-X] ANSI NCITS. SCSI Parallel Interface - X. + + 8. [FCP] ANSI NCITS. SCSI-3 Fibre Channel Protocol [ANSI + X3.269:1996]. + + + + + +Krueger, et al. Informational [Page 23] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + + 9. [FCP-2] ANSI NCITS. SCSI-3 Fibre Channel Protocol - 2 + [T10/1144-D]. + + 10. Paxon, V. End-to-end internet packet dynamics, IEEE Transactions + on Networking 7,3 (June 1999) pg 277-292. + + 11. Stone J., Partridge, C. When the CRC and TCP checksum disagree, + ACM Sigcomm (Sept. 2000). + + 12. Malkin, G. and A. Harkin, "TFTP Blocksize Option", RFC 2348, May + 1998. + + 13. Floyd, S., "Congestion Control Principles", BCP 14, RFC 2914, + September 2000. + +12. Acknowledgements + + Special thanks to Julian Satran, IBM and David Black, EMC for their + extensive review comments. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Krueger, et al. Informational [Page 24] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + +13. Author's Addresses + + Address comments to: + + Marjorie Krueger + Hewlett-Packard Corporation + 8000 Foothills Blvd + Roseville, CA 95747-5668, USA + Phone: +1 916 785-2656 + EMail: marjorie_krueger@hp.com + + Randy Haagens + Hewlett-Packard Corporation + 8000 Foothills Blvd + Roseville, CA 95747-5668, USA + Phone: +1 916 785-4578 + EMail: Randy_Haagens@hp.com + + Costa Sapuntzakis + Stanford University + 353 Serra Mall Dr #407 + Stanford, CA 94305 + Phone: 650-723-2458 + EMail: csapuntz@stanford.edu + + Mark Bakke + Cisco Systems, Inc. + 6450 Wedgwood Road + Maple Grove, MN 55311 + Phone: +1 763 398-1054 + EMail: mbakke@cisco.com + + + + + + + + + + + + + + + + + + + + +Krueger, et al. Informational [Page 25] + +RFC 3347 iSCSI Requirements and Design Considerations July 2002 + + +14. Full Copyright Statement + + Copyright (C) The Internet Society (2002). All Rights Reserved. + + This document and translations of it may be copied and furnished to + others, and derivative works that comment on or otherwise explain it + or assist in its implementation may be prepared, copied, published + and distributed, in whole or in part, without restriction of any + kind, provided that the above copyright notice and this paragraph are + included on all such copies and derivative works. However, this + document itself may not be modified in any way, such as by removing + the copyright notice or references to the Internet Society or other + Internet organizations, except as needed for the purpose of + developing Internet standards in which case the procedures for + copyrights defined in the Internet Standards process must be + followed, or as required to translate it into languages other than + English. + + The limited permissions granted above are perpetual and will not be + revoked by the Internet Society or its successors or assigns. + + This document and the information contained herein is provided on an + "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING + TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING + BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION + HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF + MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + + + + + + + + + + + + + +Krueger, et al. Informational [Page 26] + |