ietf
[Top] [All Lists]

Re: Storage over Ethernet/IP

2000-05-26 08:50:02
It won't run over the Internet because of latencies inherent on the 
public network.

at least for some storage applications, latency is not as important
as bandwidth.  e.g. you can do backups over a high-latency medium
as long as your bandwidth is adequate (though recovery from write 
errors gets a bit tricky).

Backups could go through VPNs, I suppose.  

except that you can't assume the presence of a VPN either.  you need 
authenticity and privacy specified as part of the storage access protocol.

I suppose infrequently used and low
priority files could also be accessed over the 'net.

yes, but file access protocols are better for this purpose.  
I don't see wanting to mount a raw disk drive 
across the public Internet very often.  
(except perhaps read-only... virtual cdrom, anyone?)

It will run over incredibly fast Packet over SONET Wide Area
Networks--behind firewalls.

...it's 
inappropriate to assume that it will always be used behind firewalls...

If the larger network that is employing this technology doesn't hire a
decent consultant, you might be right.  If they do, it will ALWAYS 
be behind a firewall :-)

any consultant who pretends that firewalls provide security cannot
be described as 'decent'.

Firewalls don't help with the majority of security threats...

True, but whether the server accesses the disks via SCSI over TCP or SCSI
over Fibre Channel, the SERVER is still the weak link.  

un, no.  SCSI has some inherent length/delay/number-of-stations 
limitations.  but if the disk is accessible using TCP,  there is a 
significant probability that it will be accessible from the global 
Internet and/or from local threats who have physical access to the
transmission medium, and the storage access protocol needs to assume 
that this is the case.

The transport protocol doesn't create any inherent weaknesses of 
the type you are refering to--e-mail borne viruses, internal hackers, etc.  

you're assuming a different threat model than I am.  I am indeed
assuming that storage devices will be targed, in addition to servers.

The server would still be the attack point.  Why goodness, 
the server and storage devices could be in a VLAN or something to deny
direct hack attempts against the storage device

yes, they *could* be.  but you cannot assume that they *will* be.

but the chink in the armor is how hardened is your OS?

there's more than one chink in the armor.

IP-based protocols need to be able to work in the global Internet.

Keith



<Prev in Thread] Current Thread [Next in Thread>