Comments on 05-446r9
Kevin D Butt
kdbutt at us.ibm.com
Wed Mar 22 09:34:52 PST 2006
Formatted message: <A HREF="r0603221_f.htm">HTML-formatted message</A>
Paul,
Thanks for the feedback. I have some follow up comments to consider.
Kevin D. Butt
SCSI & Fibre Channel Architect, Tape Firmware
MS 6TYA, 9000 S. Rita Rd., Tucson, AZ 85744
Tel: 520-799-2869 / 520-799-5280
Fax: 520-799-2723 (T/L:321)
Email address: kdbutt at us.ibm.com
http://www-03.ibm.com/servers/storage/
"Paul Entzel" <Paul.Entzel at quantum.com>
Sent by: owner-t10 at t10.org
03/22/2006 08:33 AM
To
Kevin D Butt/Tucson/IBM at IBMUS, <T10 at t10.org>
cc
Subject
RE: Comments on 05-446r9
Kevin,
Thanks for your comments. I have included responses below to the
technical comments so you have a chance to think them over before we
discuss them at tomorrow?s conference call.
Paul Entzel
Quantum
-----Original Message-----
From: Kevin D Butt [mailto:kdbutt at us.ibm.com]
Sent: Tuesday, March 21, 2006 4:01 PM
To: Paul Entzel; T10 at t10.org
Subject: Comments on 05-446r9
Paul and all,
I have some comments on 05-446r9
TECHNICAL:
1) Section 4.2.9.13, pg 6, last sentence of 2nd to last paragraph, "The
device server shall establish the logical position at the BOP side the
encrypted block." should be "The device server shall establish the logical
position after the failed encrypted block." This will make the behavior
consistent with reading a corrupted block.
[Paul Entzel] I disagree for two reasons:
1. This will add an extra step to the recovery process. The expected
recovery for this type of error is to send a SPIN command requesting the
Next Block Encryption Status page, send a SPOUT command with a Set Data
Encryption page configuring the encryption accordingly, and the re-issue
the read. If the tape is positioned behind the block in error it will add
another command to this recovery process to re-position in front of the
block first. <<Kevin Butt>> It was my understanding that this was known
to be a bad block (i.e. corrupted) as opposed to just a wrong key or
algorithm. Is my understanding in error?
2. The Sense Key used to report the error is DATA PROTECT. Not
change the logical position when reporting this error is consistent with
other conditions that use this Sense Key. <<Kevin Butt>> If my
understanding stated above is correct (i.e. the block is corrupted) then
this Sense Key should be MEDIUM ERROR instead. However, if I am in error,
then I agree with your comments.
2) Section 4.2.19.5, pg 8. All the statements about establishing a UA for
all other I_T Nexus that are affected by....
If this is the behavior that we take, then this will severely inhibit
being able to use a third party device - like a Decru EKM transparent to
the application. The UA's will cause the applications or host on which
the applications reside, to handle these UA's that it knows nothing about.
[Paul Entzel] I have never been a big fan of UAs. As a developer of SCSI
devices I have always found them to be a complete pain in the rear.
They?re difficult to deal with when protocol bridges are used. They get
eaten by the driver stack on the host side. Yuck. However, this is how
we manage asynchronous event reporting in SCSI. This will be an
interesting discussion topic tomorrow.
I think the UA's should be restricted to those I_T Nexus over which a
Security Protocol Out/In command has been received and not to any body
else. This will allow using an External EKM transparent to applications.
[Paul Entzel] Interesting idea you have there. It will need to be
developed a bit more before it will work, but it has potential. I
interpret your idea as adding a Boolean variable to the per I_T Nexus
database defined in subclause 4.2.19.6 that indicates if a SPIN or SPOUT
command has been executed from the I_T Nexus. Only I_T Nexus that have
this variable set to True would get UAs associated with encryption. I
have two questions:
1. When does it get set to False (resets, I_T Nexus loss, de-mount)?
2. How do we document this precedence setting feature? <<Kevin Butt>>
I was thinking about how Persistent Reserve handles UA's and some of the
UA's only get established for those I_T Nexus that are registered. I was
think this would be similar to that.
3) Section 4.2.19.6, pg 8, second list. Should a "Prohibit Encryption" be
added?
[Paul Entzel] Not necessarily. If the SCOPE field is set to PUBLIC then
control of data encryption for that I_T Nexus is passed to other
initiators and may or may not be enabled. <<Kevin Butt>> With PUBLIC and
no PROHIBIT ENCRYPTION there is no way for an I_T Nexus to make sure
encryption is not used (i.e. guarantee that if there is encryption being
used in the SAN, that they will not be effected by it.) I do not know
which direction should be taken but I think it should be discussed and a
explicit decision made on it.
4) Section 4.2.19.7, pg 9. Please add "CKORSC" to list.
[Paul Entzel] Agreed.
5) Section 4.2.19.7, pg 9. Item c) of list - key scope. I was confused
here and it took me some time to realize that "key scope" is referring to
a value in Table Y2 for the "scope" field of the set data encryption page.
Please add a definition and/or cross reference for this term.
[Paul Entzel] Everything in this structure comes from fields in the Set
Data Encryption page or from knowledge the device server has about the I_T
Nexus that sent the Set Data Encryption page. Of course, I supposed it is
possible to use an out-of-band method for establishing the data encryption
parameters (see comment 6). <<Kevin Butt>> I remember this discussion
|from the last conference call, but I still struggled with it. Is there
something that can be done to make it more clear? I think if I am this
think headed, there will be other readers just as think headed as I am.
6) The following changes are desired by IBM. We do not want to prohibit
any out-of-band methods from being used.
Section 8.5.2.7, pg 19, last paragraph. Remove the text "by processing a
Set Data Encryption page."
Section 8.5.2.7, pg 20, first three paragraphs, change the text
"in the Set Data Encryption page that established the key in the
device server."
to
"when the key was established in the device server."
[Paul Entzel] I think that would work. Or, I thi8nk both of these
paragraphs could be re-written to reference the Data Encryption Parameters
since the data they are reporting is in that structure. <<Kevin Butt>>
That would probably be better.
EDITORIAL:
1) Section 4.2.19.6, pg 8, sentence leading into second list, "The set of
possible data encryption scope values for an I_T nexus is limited to:"
please remove "limited to". "limited to" might lead a reader to infer
intent that is not intended.
2) Section 4.2.19.11, pg 11 end of 1st paragraph. Should
"non-authenticated" be changed to "unauthenticated"?
3) Section 8.5.2.7, pg 19. Second to last sentence on the page: "...,
they shall be order of increasing..." missing the word "in".
3) Section 8.5.3.1, pg 23, second sentence in first paragraph. I think
"requested" should be changed to "sent".
4) Last paragraph of pg 26: "If the device server does is not...." delete
"does".
5) Page 28, last paragraph before section 8.5.4. Missing D: "INCOMPLETE
KEY - ASSOCIATE DATA SET" s/b "INCOMPLETE KEY - ASSOCIATED DATA SET"
6) Section 8.5.4.1, pg 28, first sentence: "Several of the parameter pages
in used" delete the "in"
Thanks,
Kevin D. Butt
SCSI & Fibre Channel Architect, Tape Firmware
MS 6TYA, 9000 S. Rita Rd., Tucson, AZ 85744
Tel: 520-799-2869 / 520-799-5280
Fax: 520-799-2723 (T/L:321)
Email address: kdbutt at us.ibm.com
http://www-03.ibm.com/servers/storage/
More information about the T10
mailing list