|   | 
      | 
  
  
      | 
      | 
  
 
     | 
    | 
  
  
     | 
    | 
  
  
    |   | 
      | 
  
  
    | 
         
xen-users
Hi,
 I know a few xen users are relying on aoe as the protocol of choice to 
connect to file servers, it is elegant and lightweight.
 I've built a mini lab using 2 raid 10 file servers with drbd/HA, LVM and 
vblade mini servers for making domU available to xen servers (dom0).
It work like a charm and I wish I could deploy it but there is one 
single issue which makes me quite uncomfortable to use as is: aoe security.
 I've read this document: 
http://www.security-assessment.com/files/whitepapers/Insecurities_in_AoE.pdf
 I know we can limit somewhat access by specifying the mac address and I 
was wondering if anyone made some testing in terms of security
 Here is a paste from the conclusion from the above link, I wonder if 
anyone would like to share some thoughts or their conclusion on that topic :
Mitigations
Coraid’s hardware AoE product, EtherDrive supports MAC filtering.
 If MAC filtering is also enabled correctly on the switch infrastructure 
this provides a certain level of security.
In this case however, it is possible that various attacks on the switch 
(such as cam table
flooding), could be possible to bypass this security feature. These 
attacks however, are
outside of the scope of this whitepaper. If MAC filtering is not enabled 
on the switch layer,
then client MAC theft is possible. This is an active and invasive attack 
which will result in
lack of client service. After successfully performing this attack, it is 
subsequently possible
to utilize the “Malicious Server” technique described earlier as the 
client will have to
reconnect to the server.
 The EtherDrive disk restriction mechanism via “configuration string” 
described earlier can
be easily bypassed with packet forgery. The packet containing the 
configuration string can
be sniffed and replayed, or once the configuration string is captured, 
it can be embedded
in a forged packet. It may also be possible to either guess or 
brute-force the “configuration
string” used for authentication in order to gain unauthorized access to 
the disk.
Securing the AoE infrastructure to ensure separation between clients in 
different security
domains will alleviate the problems described herein. If both the server 
and the switch
support 802.1q VLAN trunking then the following process will provide an 
AoE infrastructure
which is resistant to the attacks described in this whitepaper:
 Configure an AoE server with multiple physical interfaces and export one 
logical array per
interface per client. Configure VLAN trunking on both the server and the 
switch. Each
AoE connected client will be in a separate VLAN.
While these steps may provide adequate protection for the data on your SAN,
 management overhead is increased and the inherent insecurity of the AoE 
protocol
remains. The security lies with the infrastructure which itself needs to 
be configured
correctly in order to be properly resistant to attack.
 11 A patch to provide MAC filtering for the linux userland server was 
published on the AoE mailing list by
Fran Firman. http://aoetools.sourceforge.net
++
--
 Virtual Space International Inc. 
Steven Dugway USA 206-734-HOST Canada 514-939-HOST (4678) ext 5
Skype:stevenvsi; savetimehosting.net 911hosting.net goodprivacy.net
Spam is not allowed: AUP http://www.virtualspaceintl.net/acceptable_use.html
--------------------------------------------------------------
Internet Is Here To Stay, Make Sure Your Business Is!
--------------------------------------------------------------
_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users
 
 |   
 
| <Prev in Thread] | 
Current Thread | 
[Next in Thread>
 |  
- [Xen-users] aoe security,
Steven <=
 
 
 |  
  
 | 
    | 
  
  
    |   | 
    |