One document matched: draft-ietf-ips-iscsi-reqmts-02.txt

Differences from draft-ietf-ips-iscsi-reqmts-01.txt


IP Storage Working Group                                       M. Krueger 
                                                               R. Haagens 
Internet Draft                                            Hewlett-Packard
                                                              Corporation 
Category: Informational                                                     
                                                           C. Sapuntzakis 
                                                                 M. Bakke 
                                                            Cisco Systems 

Document: draft-ietf-ips-iscsi-reqmts-02.txt                   April 2001 
 
 
              iSCSI Requirements and Design Considerations 
 
 
Status of this Memo 
 
   This document is an Internet-Draft and is in full conformance with all 
   provisions of Section 10 of RFC2026 [1].  
    
   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF), its areas, and its working groups.  Note that 
   other groups may also distribute working documents as Internet-Drafts. 
    
   Internet-Drafts are draft documents valid for a maximum of six months and 
   may be updated, replaced, or obsoleted by other documents at any time.  It 
   is inappropriate to use Internet-Drafts as reference material or to cite 
   them other than as "work in progress." 
    
   The list of current Internet-Drafts can be accessed at 
   http://www.ietf.org/ietf/1id-abstracts.txt 
    
   The list of Internet-Draft Shadow Directories can be accessed at 
   http://www.ietf.org/shadow.html. 
    
    
Abstract 
    
   The IP Storage Working group is chartered with developing comprehensive 
   technology to transport block storage data over IP protocols.  This effort 
   includes a protocol to transport the Small Computer Systems Interface 
   (SCSI) protocol over the internet (iSCSI).  The initial version of the 
   iSCSI protocol will define a mapping of SCSI transport protocol over 
   TCP/IP so that SCSI storage controllers (principally disk and tape arrays 
   and libraries) can be attached to IP networks, notably Gigabit Ethernet 
   (GbE) and 10 Gigabit Ethernet (10 GbE). 
    
   This document specifies the requirements iSCSI and it's related 
   infrastructure should satisfy and the design considerations guiding the 
   iSCSI protocol development efforts. In the interest of timely adoption of 
   the iSCSI protocol, this group has chosen to focus the first version of 
   the protocol to work with the existing SCSI architecture and commands, and 
   the existing TCP/IP transport layer.  Both these protocols are widely-
   deployed and well-understood.  The thought is that using these mature 
   protocols will entail a minimum of new invention, the most rapid possible 
  
Krueger          Informational - Expires August 2001                1 
               iSCSI Reqmnts and Design Considerations      Nov. 2000 
 
 
   adoption, and the greatest compatibility with Internet architecture, 
   protocols, and equipment. 
    
   The iSCSI protocol is a mapping of SCSI to TCP, and constitutes a "SCSI 
   transport" as defined by the ANSI T10 document SCSI SAM-2 document [SAM2, 
   p. 3, "Transport Protocols"]. 
    
Conventions used in this document 
    
   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 
   "SHOULD", "SHOULD NOT", "RECOMMENDED",  "MAY", and "OPTIONAL" in this 
   document are to be interpreted as described in RFC-2119 [2]. 
    
Table of Contents 
    
1.  Summary of Requirements...............................................2 
2.  iSCSI Design Considerations...........................................6 
 2.1. General Discussion..................................................6 
 2.2. Performance/Cost....................................................8 
 2.3. Framing.............................................................9 
 2.4. High bandwidth, bandwidth aggregation..............................11 
3.  Ease of implementation/complexity of protocol........................12 
4.  Reliability and Availability.........................................13 
 4.1. Detection of Data Corruption.......................................13 
 4.2. Recovery...........................................................13 
5.  Interoperability.....................................................14 
 5.1. Internet infrastructure............................................14 
 5.2. SCSI...............................................................14 
6.  Security Considerations..............................................15 
 6.1. Extensible Security................................................15 
 6.2. Authentication.....................................................15 
 6.3. Data Integrity.....................................................16 
 6.4. Data Privacy.......................................................16 
7.  Management...........................................................16 
 7.1. Naming.............................................................17 
 7.2. Topology Discovery.................................................17 
8.  Internet Accessibility...............................................18 
 8.1. Denial of Service..................................................18 
 8.2. Firewalls and Proxy servers........................................18 
 8.3. Congestion Control and Transport Selection.........................18 
9.  Virtualization.......................................................19 
10. Definitions..........................................................19 
11. References...........................................................20 
12. Acknowledgements.....................................................20 
13. Author's Addresses...................................................20 
   
1. Summary of Requirements 
    
   The iSCSI standard: 
    
>From section 2.1 General Discussion: 
    
  
Krueger             Informational - Exp. May 2001                   2 
               iSCSI Reqmnts and Design Considerations      Nov. 2000 
 
 
   MUST NOT require modifications to the current IP and Ethernet 
   infrastructure to support storage traffic over TCP. 
    
>From section 2.2 Performance/Cost: 
   MUST allow implementations to equal or improve on the current state of the 
   art for SCSI interconnects. 
    
   MUST enable cost competitive implementations. 
 
   SHOULD minimize control overhead  to enable low delay communications. 
    
   MUST provide high bandwidth and bandwidth aggregation. 
    
   MUST have low host CPU utilizations, equal to or better than current 
   technology. 
    
   MUST be possible to build I/O adapters that handle the entire SCSI task. 
    
   MUST permit zero-copy memory architectures. 
    
   MUST NOT impose complex operations on host software. 
    
   MUST be cost competitive with alternative storage networking technologies. 
 
>From section 2.4 High Bandwidth/Bandwidth Agreggation: 
   MUST allow the initiator and target to use multiple network interfaces and 
   multiple paths through the network. 
    
   MUST operate over a single TCP connection. 
    
   MUST provide a FIFO transport of SCSI commands, even when commands are 
   sent along different paths. This command ordering mechanism SHOULD seek to 
   minimize the amount of communication necessary across multiple adapters 
   doing transport off-load. 
    
   SHOULD support connection binding, and it MUST be optional to implement. 
    
>From section 3 Ease of Implementation/Complexity of Protocol: 
   SHOULD keep the protocol simple. 
    
   SHOULD minimize optional features. 
    
   SHOULD negotiate optional features at session setup. 
    
>From section 4.1 Detection of Data Corruption: 
   MUST support a data integrity check format for use in digest generation. 
     
   MAY use separate digest for data and headers. 
     
   iSCSI header format SHOULD be extensible to include other data integrity 
   digest calculation methods. 
    
>From section 4.2 Recovery: 
  
Krueger             Informational - Exp. May 2001                   3 
               iSCSI Reqmnts and Design Considerations      Nov. 2000 
 
 
   MUST specify mechanisms to recover in a timely fashion from  
   failures on the initiator, target, or connecting infrastructure. 
    
   This recovery MUST particularly work for non-idempotent requests. 
    
   SHOULD take into account fail-over schemes for mirrored targets or highly 
   available storage configurations. 
    
   SHOULD provide a method for sessions to be gracefully terminated and 
   restarted that can be initiated by either the initiator or target.   
    
>From section 5 Interoperability: 
   iSCSI protocol document MUST be clear and unambiguous. 
    
>From section 5.1 Internet Infrastructure: 
   MUST: 
    -- be compatible with both IPv4 and IPv6 
    -- use TCP connections conservatively, keeping in mind there may be many 
       other users of TCP on a given machine. 
     
   MUST NOT require changes to existing internet protocols. 
    
>From section 5.2 SCSI: 
   SHOULD comply with the requirements of the SCSI Architecture Model [SAM2]. 
    
   MUST NOT require changes to the SCSI-3 command sets and SCSI client code 
   except to reflect lengthier iSCSI target names. 
    
   SHOULD track changes to SCSI and the SCSI Architecture Model. 
    
   MUST support all SCSI-3 command sets and device types. 
    
   MUST allow for the construction of gateways to other SCSI transports 
    
   MUST reliably transport SCSI commands from the initiator to the target. 
    
   MUST support ordered delivery of SCSI commands from the initiator to the 
   target, to support SCSI Task Queuing. 
    
>From section 6.1 Extensible Security: 
   SHOULD require minimal configuration and overhead in the insecure 
   operation. 
    
   SHOULD provide for strong authentication when increased security is 
   required. 
    
   SHOULD allow integration of new security mechanisms without breaking 
   backwards compatible operation. 
    
>From section 6.2 Authentication: 
   MAY support various levels of authentication security. 
    
   MUST support private authenticated login. 
  
Krueger             Informational - Exp. May 2001                   4 
               iSCSI Reqmnts and Design Considerations      Nov. 2000 
 
 
    
   iSCSI authenticated login MUST be resilient against passive attacks. 
    
   MUST NOT preclude optional data origin authentication of its 
   communications. 
 
>From section 6.3 Data Integrity: 
   SHOULD NOT preclude use of additional data integrity protection protocols 
   (IPSec, TLS). 
     
>From section 6.4 Data Privacy: 
   MAY use a data encryption protocol such as TLS or IPsec ESP to provide 
   data privacy between iSCSI endpoints. 
    
>From section 7 Management: 
 
   SHOULD be manageable using IP-based management protocols (eg. SNMP, RMI). 
    
>From section 7.1 Naming: 
   MUST support the naming architecture of SAM-2. 
    
   The means by which an iSCSI resource is located MUST use or extend 
   existing internet standard resource location methods (URL). 
    
   MUST provide a means of identifying iSCSI targets by a unique identifier 
   that is independent of the path on which it is found. 
    
   The format for the iSCSI names MUST use existing naming authorities. 
    
   An iSCSI name SHOULD be a human readable string in an international 
   character set encoding. 
    
   Standard internet lookup services SHOULD be used to resolve iSCSI names. 
    
   SHOULD deal with the complications of the new SCSI security architecture. 
    
   MUST support SCSI 3rd party operations 
    
>From section 7.2 Discovery: 
    
   MUST have no impact on the use of current IP network discovery techniques. 
    
   MUST provide some means of determining whether an iSCSI service is
   available through an IP address. 
    
   SCSI protocol-dependent techniques SHOULD be used for further discovery 
   beyond the iSCSI layer. 
    
   MUST provide a method of discovering, given an IP end point on its well-
   known port, the list of SCSI targets available to the requestor.  The use 
   of this discovery service MUST be optional. 
    
>From section 8 Internet Accessability. 
  
Krueger             Informational - Exp. May 2001                   5 
               iSCSI Reqmnts and Design Considerations      Nov. 2000 
 
 
    
   SHOULD be scrutinized for denial of service issues and they should be 
   addressed. 
    
>From section 8.2 Firewalls and Proxy Servers 
    
   use of IP addresses and TCP ports SHOULD be firewall friendly. 
    
>From section 8.3 Congestion Control and Transport Selection 
 
   MUST be a good network citizen with TCP-compatible congestion control (as 
   defined in RFC 2309). 
    
   iSCSI implementations MUST NOT use multiple connections as a means to 
   avoid transport-layer congestion control. 
    
2. iSCSI Design Considerations 
  2.1. General Discussion 
    
   Traditionally, storage controllers (e.g., disk array controllers, tape 
   library controllers) have supported the SCSI-3 protocol, and have been 
   attached to computers through the SCSI parallel bus or through Fibre 
   Channel.  File-oriented storage controllers have supported the NFS and/or 
   CIFS protocols, and have been attached directly to IP networks such as 
   Ethernet. 
    
   The IP infrastructure offers compelling advantages for volume/block-
   oriented storage attachment compared to current approaches.  It offers the 
   opportunity to take advantage of the performance/cost benefits provided by 
   competition in the internet marketplace. This reduces the cost of storage 
   infrastructure by: 
    
    -- Increasing performance (market driven by networking demand) 
    -- Offers richer array of management, security and QoS solutions 
    -- Economies arising from the need to install and operate only single 
       type of network 
    
   In addition, mapping SCSI over IP provides: 
    
    -- Extended distance ranges 
    -- Connectivity to "carrier class" services that support IP 
      
   The following applications for iSCSI are contemplated: 
    
    -- Local storage access, consolidation, clustering and pooling (as in the 
       data center) 
    -- Client access to remote storage (eg. a "storage service provider") 
    -- Local and remote synchronous and asynchronous mirroring between 
       storage controllers 
    -- Local and remote backup and recovery 
  
Krueger             Informational - Exp. May 2001                   6 
               iSCSI Reqmnts and Design Considerations      Nov. 2000 
 
 
    
   iSCSI MUST support the following topologies: 
    
    -- Point-to-point direct connections 
    -- Dedicated storage LAN, consisting of one or more LAN segments 
    -- Shared LAN, carrying a mix of traditional LAN traffic plus storage 
       traffic 
    -- LAN-to-WAN extension using IP routers or carrier-provided "IP 
       Datatone" 
    -- Private networks and the public Internet 
     
   iSCSI protocols will enable local-area storage networks built using 
   Ethernet LAN switches.  These networks may be dedicated to storage, or 
   shared with traditional Ethernet uses, as determined by cost, performance, 
   administration, and security considerations.  In the local area, TCP's 
   adaptive retransmission timers provide for automatic and rapid error 
   detection and recovery. 
    
   IP LAN-WAN routers may be used to extend the IP storage network to the 
   wide area, permitting remote disk access (as for a storage utility), 
   synchronous and asynchronous remote mirroring, and remote backup and 
   restore (as for tape vaulting).  In the WAN,  using TCP end-to-end avoids 
   the need for specialized equipment for protocol conversion, ensures data 
   reliability, copes with network congestion, and provides adaptive 
   retransmission strategies to WAN delays. 
    
   The iSCSI technology deployment will involve the following elements: 
    (1)  Conclusion of a complete, unambigous protocol standard and 
         supporting implementations;  
    (2)  Development of Ethernet storage NICs and related driver and 
         protocol software; [NOTE: high-speed applications of iSCSI are 
         expected to require significant portions of the iSCSI/TCP/IP 
         implementation in hardware to achieve the necessary throughput.]  
    (3)  Development of compatible storage controllers; and  
    (4)  The likely development of translating gateways to provide 
         connectivity between the Ethernet storage network and the Fibre 
         Channel and/or parallel-bus SCSI domains. 
    (5)  Development of specifications for iSCSI device management as MIBs, 
         XML schemas, etc. 
    (6)  Development of management and directory service applications to 
         support a robust SAN infrastructure. 
    
   Products could initially be offered for Gigabit Ethernet attachment, with 
   rapid migration to 10 GbE.  For performance competitive with alternative 
   SCSI transports, it will be necessary to implement the performance path of 
   the full protocol stack in hardware.  These new storage NICs might perform 
   full-stack processing of a complete SCSI task, analogous to today's SCSI 
   and Fibre Channel HBAs, and might also support all host protocols that use 
   TCP (NFS, CIFS, HTTP, etc). 
    
   The iSCSI protocol MUST NOT require modifications to the current IP and 
   Ethernet infrastructure to support storage traffic over TCP.  
   Nevertheless, the performance and security requirements of storage creates 
  
Krueger             Informational - Exp. May 2001                   7 
               iSCSI Reqmnts and Design Considerations      Nov. 2000 
 
 
   opportunities for improvement in security protocols and QoS 
   implementations.  The addition of storage traffic to local and wide-area 
   internets (and even to the public Internet) may introduce increased 
   requirements for traffic monitoring and engineering in those environments. 
    
   Organizations may initially choose to operate storage networks based on 
   iSCSI that are independent of (isolated from) their current data networks 
   except for secure routing of storage management traffic.  These 
   organizations will benefit from the high performance/cost of IP equipment 
   and a unified management architecture, compared to alternative means of 
   building storage networks.  As security and QoS evolve, it may become 
   reasonable to build combined networks with shared infrastructure; 
   nevertheless, it is likely that sophisticated users will choose to keep 
   their storage sub-networks isolated to afford the best control of security 
   and QoS. 
    
   The charter of the IETF IP Storage Working Group (IPSWG) describes the 
   broad goal of mapping SCSI to IP using a transport that has proven 
   congestion avoidance behavior and broad implementation on a variety of 
   platforms.  Within that broad charter, several transport alternatives may 
   be considered.  Initial IPS work focuses on TCP, and this requirements 
   document is restricted to that domain of interest. 
    
  2.2. Performance/Cost 
    
   In general, iSCSI MUST allow implementations to equal or improve on the 
   current state of the art for SCSI interconnects.  This goal breaks down 
   into several types of requirement: 
    
   Cost competitive with alternative storage network technologies: 
    
   In order to be adopted by vendors and the user community, the iSCSI 
   protocol MUST enable cost competitive implementations when compared to 
   other SCSI transports (Fibre Channel). 
    
   Low delay communication: 
    
   Conventional storage access is of a stop-and-wait or remote procedure call 
   type.  Applications typically employ very little pipelining of their 
   storage accesses, and so storage access delay directly impacts 
   performance.  The delay imposed by current storage interconnects, 
   including protocol processing, is generally in the range of 100 
   microseconds.  The use of caching in storage controllers means that many 
   storage accesses complete almost instantly, and so the delay of the 
   interconnect can have a high relative impact on overall performance.  When 
   stop-and-wait IO is used, the delay of the interconnect will affect 
   performance.  The iSCSI protocol SHOULD minimize control overhead, which 
   adds to delay. 
    
   Low host CPU utilization, equal to or better than current technology: 
    
  
Krueger             Informational - Exp. May 2001                   8 
               iSCSI Reqmnts and Design Considerations      Nov. 2000 
 
 
   For competitive performance, the iSCSI protocol MUST allow three key 
   implementation goals to be realized: 
     
   (1)  iSCSI MUST make it possible to build I/O adapters that handle an 
        entire SCSI task, as alternative SCSI transport implementations do.   
   (2)  The protocol MUST permit "zero-copy" memory architectures, where the 
        I/O adapter reads or writes host memory exactly once per disk 
        transaction.  
   (3)  The protocol SHOULD NOT impose complex operations on the host 
        software, which would increase host instruction path length relative 
        to alternatives. 
    
   Direct data placement (zero-copy iSCSI): 
    
   This is an important implementation goal.  In an iSCSI system, each of the 
   end nodes (for example host computer and storage controller) has ample 
   memory; but the intervening nodes (NIC, switches) do not.  Assume a WAN-
   scale retransmission requirement of 25 MB (1 Gbps) or 250 MB (10 Gbps, see 
   Framing discussion).  Therefore, intervening nodes MUST NOT be required to 
   buffer data. 
    
   High bandwidth, bandwidth aggregation: 
    
   The bandwidth (transfer rate, MB/sec) supported by storage controllers is 
   rapidly increasing, due to several factors: 
     
     1. Increase in disk spindle and controller performance;  
     2. Use of ever-larger caches, and improved caching algorithms;  
     3. Increased scale of storage controllers (number of supported 
        spindles, speed of interconnects).   
    
   The iSCSI protocol MUST provide for full utilization of available link 
   bandwidth.  The protocol MUST also allow an implementation to exploit 
   parallelism (multiple connections) at the device interfaces and within the 
   interconnect fabric. 
    
   The next two sections further discuss the need for direct data placement 
   and high bandwidth. 
    
  2.3. Framing 
 
   Framing refers to the addition of information in a header, or the data 
   stream to allow implementations to locate the boundaries of an iSCSI 
   protocol data unit (PDU) within the TCP byte stream.  There are two 
   technical requirements driving framing: interfacing needs, and accelerated 
   processing needs. 
    
   A framing solution that addresses the "interfacing needs" of the iSCSI 
   protocol will facilitate the implementation of a message-based upper layer 
   protocol (iSCSI) on top of an underlying byte streaming protocol (TCP).  
   Since TCP is a reliable transport, this can be accomplished by including a 
  
Krueger             Informational - Exp. May 2001                   9 
               iSCSI Reqmnts and Design Considerations      Nov. 2000 
 
 
   length field in the iSCSI header.  Finding the protocol frame assumes that 
   the receiver will parse from the beginning of the TCP data stream, and 
   never make a mistake (lose alignment on packet headers). 
    
   The other technical requirement for framing, "accelerated processing", 
   stems from the need to handle increasingly higher data rates in the 
   physical media interface.  Two needs arise from higher data rates: 
     
   (1)  LAN environment - NIC vendors seek ways to provide "zero-copy" 
        methods of moving data directly from the wire into application 
        buffers.  
    
   (2)  WAN environment- the emergence of high bandwidth, high latency, low 
        bit error rate physical media places huge buffer requirements on the 
        physical interface solutions. 
    
   First, vendors are producing network processing hardware that offloads 
   network protocols to hardware solutions to achieve higher data rates.  The 
   concept of "zero-copy" seeks to store blocks of data in appropriate memory 
   locations (aligned) directly off the wire, even in when data is reordered 
   due to packet loss.  This is necessary to drive actual data rates of 10 
   Gigabits and beyond. 
    
   Secondly, in order for iSCSI to be successful in the WAN arena it MUST be 
   possible to operate efficiently in high bandwidth, high delay networks.  
   The emergence of multi-gigabit IP networks with latencies in the tens to 
   hundreds of milliseconds presents a challenge. To fill such large pipes, 
   tens of megabytes of outstanding requests from the application are needed. 
   In addition, some protocols potentially require tens of megabytes at the 
   transport layer to deal with buffering for reassembly of data when packets 
   are received out-of-order. 
    
   Consider that a network pipe at 10 Gbps x 200 msec holds 250 MB. [Assume 
   land-based communication with a spot half way around the world at the 
   equator.  Ignore additional distance due to cable routing.  Ignore 
   repeater and switching delays; consider only a speed-of-light delay of 5 
   microsec/km.  The circumference of the globe at the equator is approx. 
   40000 km (round-trip delay must be considered to keep the pipe full).  10 
   Gb/sec x 40000 km x 5 microsec/km x B / 8b = 250 MB].  In a conventional 
   TCP implementation, loss of a TCP segment means that stream processing 
   MUST stop until that segment is recovered, which takes at least a time of 
   <network round trip> to accomplish.  Following the example above, an 
   implementation would be obliged to catch 250 MB of data into an anonymous 
   buffer before resuming stream processing; later, this data would need to 
   be moved to its proper location.  Some proponents of iSCSI seek some means 
   of putting data directly where it belongs, and avoiding extra data 
   movement in the case of segment drop.  This is a key concept in 
   understanding the debate behind framing methodologies. 
    
   The framing of the iSCSI protocol impacts both the "interfacing needs" and 
   the "accelerated processing needs", however, while including a length in a 
   header may suffice for the "interfacing needs", it will not serve the 
   "accelerated processing needs". The framing mechanism developed should 
  
Krueger             Informational - Exp. May 2001                  10 
               iSCSI Reqmnts and Design Considerations      Nov. 2000 
 
 
   allow resynchronization of packet boundaries even in the case where a 
   packet is temporarily missing in the incoming data stream. 
    
  2.4. High bandwidth, bandwidth aggregation 
 
   Experience has shown that any single link can be saturated by storage 
   traffic. Scientific data applications, asynchronous and synchronous data 
   replication are examples of storage applications that have pushed and 
   continue to push the limits of throughput.  
    
   The iSCSI protocol MUST allow the initiator and target to use multiple 
   network interfaces and multiple paths through the network for increased 
   throughput.  However, in order to provide for lower cost implementations, 
   the protocol MUST operate over a single TCP connection. 
    
   Some applications, such as log updates, streaming tape, and replication, 
   require ordering of updates and thus ordering of SCSI commands. An 
   initiator may maintain ordering by waiting for each update to complete 
   before issuing the next (a.k.a. synchronous updates). However, the 
   throughput of synchronous updates decreases inversely with increases in 
   latency of the operation. 
     
   To allow an initiator to maintain throughput, the SCSI task queuing 
   mechanism allows an initiator to have multiple commands outstanding at the 
   target simultaneously and to express ordering constraints on the execution 
   of those commands. The task queuing mechanism is only effective if the 
   commands arrive at the target in the order they were presented to the 
   initiator (FIFO order).  
    
   The iSCSI standard MUST provide a FIFO transport of SCSI commands, even 
   when commands are sent along different paths.  This is referred to as 
   "command ordering".  This command ordering mechanism SHOULD seek to 
   minimize the amount of communication necessary across multiple adapters 
   doing transport off-load.  
 
   There are a few potential ways to satisfy the multiple path and ordering 
   requirements.  
    
   A popular way to satisfy the multiple-path requirement is to have a driver 
   above the SCSI layer instantiate multiple copies of the SCSI transport, 
   each communicating to the target along a different path. "Wedge" drivers 
   use this technique today to attain high performance. Unfortunately, wedge 
   drivers must wait for acknowledgement of completion of each request (stop-
   and-wait) to ensure ordered updates. 
    
   Another approach might be for iSCSI protocol to use multiple instances of 
   its underlying transport (e.g. TCP). The iSCSI layer would make these 
   independent transport instances appear as one SCSI transport instance and 
   maintain the ability to do ordered SCSI command queuing. The document will 
   refer to this technique as "connection binding" for convenience. 
    
  
Krueger             Informational - Exp. May 2001                  11 
               iSCSI Reqmnts and Design Considerations      Nov. 2000 
 
 
   The iSCSI protocol SHOULD support connection binding, and it MUST be 
   optional to implement. 
    
   In the presence of connection binding, there are two ways to assign 
   features to connections. In the symmetric approach, all the connections 
   are identical from a feature standpoint. In the asymmetric model, 
   connections have different features. For example, some connections may be 
   used primarily for data transfers whereas others are used primarily for 
   SCSI commands. 
    
   Since the iSCSI protocol must support the case where there was only one 
   transport connection, the protocol must have command, data, and status 
   travel over the same connection. 
    
   In the case of multiple connections, the iSCSI protocol MUST keep the 
   command and its associated data and status on the same connection 
   (connection allegiance). Sending data and status on the same connection is 
   desirable because this guarantees that status is received after the data 
   (TCP provides ordered delivery). In the case where each connection is 
   managed by a separate processor, allegiance decreases the need for inter-
   processor communication.  This symmetric approach is a natural extension 
   of the single connection approach. 
    
   An alternate approach that was extensively discussed involved sending all 
   commands on a single connection and the associated data and status on a 
   different connection (asymetric approach). In this scheme, the transport 
   ensures the commands arrive in order. The protocol on the data and status 
   connections is simpler, perhaps lending itself to a simpler realization in 
   hardware.  One disadvantage of this approach is that the recovery 
   procedure is different if a command connection fails vs. a data 
   connection. Some argued that this approach would require greater inter-
   processor communication when connections are spread across processors.   
   The reader may reference the mail archives of the IPS mailing list between 
   June and September of 2000 for extensive discussions on symmetric vs 
   asymmetric connection models. 
    
   This requirements document does not specify any requirements with respect 
   to multiple connections design as no working group consensus was ever 
   reached on this topic. 
    
3. Ease of implementation/complexity of protocol 
    
   Experience has shown that adoption of a protocol by the internet community 
   is inversely proportional to its complexity.  In addition, the simpler the 
   protocol, the easier it is to diagnose problems.  The designers of iSCSI 
   SHOULD strive to fulfill the requirements of the creating a SCSI transport 
   over IP, while keeping the protocol as simple as possible. 
      
   In the interest of simplicity, iSCSI SHOULD minimize optional features.  
   When features are deemed necessary, the protocol SHOULD allow for feature 
   negotiation at session establishment (login) and provide for rejection 
   when an implementation does not support a requested feature. 
  
Krueger             Informational - Exp. May 2001                  12 
               iSCSI Reqmnts and Design Considerations      Nov. 2000 
 
 
    
4. Reliability and Availability 
 
  4.1. Detection of Data Corruption 
 
   There have been several research papers that suggest that the TCP checksum 
   calculation allows a certain number of bit errors to pass undetected [8] 
   [9].   
    
   In order to protect against data corruption, the iSCSI protocol MUST 
   support a data integrity check format for use in digest generation.  
    
   The iSCSI protocol MAY use separate digests for data and headers. In an 
   iSCSI proxy or gateway situation, the iSCSI headers are removed and re-
   built, and the TCP stream is terminated on either side.  This means that 
   even the TCP checksum is removed and recomputed within the gateway.  To 
   ensure the protection of commands, data, and status the iSCSI protocol 
   MUST include a CRC or other digest mechanism that is computed on the SCSI 
   data block itself, as well as on each command and status message.  Since 
   gateways may strip iSCSI headers and rebuild them, a separate header CRC 
   is required.  Two header digests, one for invariant portions of the header 
   (addresses) and one for the variant portion would provide protection 
   against changes to portions of the header that should never be changed by 
   middle boxes (eg, addresses). 
     
   The iSCSI header format SHOULD be extensible to include other digest 
   calculation methods. 
    
  4.2. Recovery 
    
   The SCSI protocol was originally designed for a parallel bus transport 
   that was highly reliable.  SCSI applications tend to assume that transport 
   errors never happen, and when they do, SCSI application recovery tends to 
   be expensive in terms of time and computational resources. 
    
   iSCSI protocol design, while placing an emphasis on simplicity, MUST lead 
   to timely recovery from failure of initiator, target, or connecting 
   internet infrastructure (cabling, data path equipment such as routers, 
   etc).   
    
   This recovery MUST particularly work for non-idempotent requests, such as 
   operations on tape drives. 
    
   The iSCSI protocol error recover mechanism SHOULD take into account fail-
   over schemes for mirrored targets or highly available storage 
   configurations that provide paths to target data through multiple "storage 
   servers".  This would provide a basis for layered technologies like high 
   availability and clustering. 
    
  
Krueger             Informational - Exp. May 2001                  13 
               iSCSI Reqmnts and Design Considerations      Nov. 2000 
 
 
   The iSCSI protocol SHOULD also provide a method for sessions to be 
   gracefully terminated and restarted that can be initiated by either the 
   initiator or target.  This provides the ability to gracefully fail over an 
   initiator or target, or reset a target after performing maintenance tasks 
   such as upgrading software. 
    
5. Interoperability 
    
   It MUST be possible for initiators and targets that implement the required 
   portions of the iSCSI specification to interoperate.  While this 
   requirement is so obvious that it doesn't seem worth mentioning, if the 
   protocol specification contains ambiguous wording, different 
   implementations may not interoperate.  The iSCSI protocol document MUST be 
   clear and unambiguous. 
    
  5.1. Internet infrastructure 
    
   The iSCSI protocol MUST: 
    -- be compatible with both IPv4 and IPv6 
    -- use TCP connections conservatively, keeping in mind there may be many 
       other users of TCP on a given machine. 
     
   The iSCSI protocol MUST NOT require changes to existing internet protocols 
     
  5.2. SCSI 
 
   In order to be considered a SCSI transport, the iSCSI standard MUST comply 
   with the requirements of the SCSI Architecture Model [SAM2] for a SCSI 
   transport. 
    
   iSCSI is intended to be a new SCSI "transport" [SAM2].  As a mapping of 
   SCSI over TCP, iSCSI requires interaction with both T10 and IETF.  
   However, the iSCSI protocol MUST NOT require changes to the SCSI-3 command 
   sets and SCSI client code except to reflect lengthier iSCSI target names 
   and potentially lengthier timeouts.  Collaboration with T10 will be 
   necessary to achieve this requirement.  Storage attachment to IP networks 
   will engender an unprecedented potential for device sharing.  This alone 
   may impact future T10 work. 
    
   The iSCSI protocol SHOULD track changes to SCSI and the SCSI Architecture 
   Model. 
    
   The iSCSI protocol MUST support all SCSI-3 command sets and device types. 
   The primary focus is on supporting                                ††larger                                     ĖĖ devices: host computers and 
   storage controllers (disk arrays, tape libraries). However, other command 
   sets (printers, scanners) MUST be supported. These requirements MUST NOT 
   be construed to mean that iSCSI MUST be natively implementable on all of 
   today's SCSI devices, which might have limited processing power or memory. 
     
  
Krueger             Informational - Exp. May 2001                  14 
               iSCSI Reqmnts and Design Considerations      Nov. 2000 
 
 
   The iSCSI protocol MUST allow for the construction of gateways to other 
   SCSI transports, including parallel SCSI [SPI-X] and to SCSI-FCP[FCP, FCP-
   2].  It MUST be possible to construct "translating" gateways so that iSCSI 
   hosts can talk to SCSI-X devices; so that SCSI-X devices can talk to each 
   other over an iSCSI network; and so that SCSI-X hosts can talk to iSCSI 
   devices (where SCSI-X refers to parallel SCSI, SCSI-FCP, or SCSI over any 
   other transport).  This requirement is implied by support for SAM-2, but 
   is worthy of emphasis. These are true application protocol gateways, and 
   not just bridge/routers.  The different standards have only the SCSI-3 
   command set layer in common.  These gateways are not mere packet 
   forwarders. 
    
   The iSCSI protocol MUST reliably transport SCSI commands from the 
   initiator to the target. According to [SAM-2, p. 17.] "The function of the 
   service delivery subsystem is to transport an error-free copy of the 
   request or response between the sender and the receiver" [SAM-2, p. 22]. 
   The iSCSI protocol MUST correctly deal with packet drop, duplication, 
   corruption, stale packets, and re-ordering. 
    
   iSCSI MUST support ordered delivery of SCSI commands from the initiator to 
   the target, to support SCSI Task Queuing. 
    
6. Security Considerations 
 
   In the past, directly attached storage systems have implemented minimal 
   security checks because the physical connection offered little chance for 
   attack.   Transporting block storage (SCSI) over IP opens a whole new 
   opportunity for a variety of malicious attacks.  Attacks can take the 
   active form (identity spoofing, man-in-the-middle) or the passive form 
   (eavesdropping). 
    
  6.1. Extensible Security 
 
   The security services required for communications depends on the 
   individual network configurations and environments.  Organizations are 
   setting up Virtual Private Networks(VPN), also known as Intranets, that 
   will require one set of security functions for communications within the 
   VPN and possibly many different security functions for communications 
   outside the VPN to support geographically separate components.  The iSCSI 
   protocol is applicable to a wide range of internetworking environments 
   that may employ different security policies.  The protocol SHOULD require 
   minimal configuration and overhead in the insecure operation, provide for 
   strong authentication when increased security is required, and allow 
   integration of new security mechanisms without breaking backwards 
   compatible operation. 
    
  6.2. Authentication 
    
  
Krueger             Informational - Exp. May 2001                  15 
               iSCSI Reqmnts and Design Considerations      Nov. 2000 
 
 
   The iSCSI protocol MAY support various levels of authentication security, 
   ranging from no authentication to secure authentication using public or 
   private keys. 
    
   The iSCSI protocol MUST support private authenticated login.  
   Authenticated login aids the target in blocking the unauthorized use of 
   SCSI resources.  "Private" authenticated login mandates protected identity 
   exchange (no clear text passwords at a minimum).  Since block storage 
   privacy is considered critical in enterprises and many IP networks may 
   have access holes, organizations will want to protect their IP SCSI 
   resources. 
    
   The iSCSI authenticated login MUST be resilient against passive attacks 
   since many IP networks are vulnerable to packet inspection. Simple, US-
   exportable techniques exist to satisfy this requirement. 
    
   In addition, the iSCSI protocol MUST NOT preclude optional data origin 
   authentication of its communications. Data origin authentication is 
   critical since IP networks are vulnerable to source spoofing, where a 
   malicious third party can pretend to send packets from the initiatorĖs IP 
   address. 
    
   These requirements should be met using a variety of internet protocols, 
   such as IPsec or TLS. The endpoints may negotiate the authentication 
   method, optionally none.  
    
  6.3. Data Integrity 
    
   The iSCSI protocol SHOULD NOT preclude use of additional data integrity 
   protection protocols (IPSec, TLS). 
    
  6.4. Data Privacy 
    
   Block storage is used for storing sensitive information, where data 
   privacy is critical.  An application may encrypt the data blocks before 
   writing them to storage - this provides the best protection for the 
   application. Even if the storage or communications are compromised, the 
   attacker will have difficulty reading the data. 
    
   In certain environments, encryption may be desired to provide an extra 
   assurance of privacy. An iSCSI implementation MAY use a data encryption 
   protocol such as TLS or IPsec ESP to provide data privacy between iSCSI 
   endpoints. 
    
7. Management 
    
   The iSCSI protocol layer SHOULD be manageable using IP-based management 
   protocols (eg. SNMP, RMI).   
    
  
Krueger             Informational - Exp. May 2001                  16 
               iSCSI Reqmnts and Design Considerations      Nov. 2000 
 
 
   The iSCSI protocol document SHOULD NOT define the management architecture 
   for iSCSI within the network infrastructure. 
    
  7.1. Naming 
    
   Whenever possible, iSCSI MUST support the naming architecture of SAM-2.  
   Deviations and uncertainties MUST be made explicit, and comments and 
   resolutions worked out between ANSI T10 and the IPS working group. 
    
   The means by which an iSCSI resource is located MUST use or extend 
   existing internet standard resource location methods.  RFC 1783 [10] 
   specifies URL syntax and semantics which should be sufficiently extensible 
   for the iSCSI resource. 
    
   The iSCSI protocol MUST provide a means of identifying an iSCSI storage 
   device by a unique identifier that is independent of the path on which it 
   is found.  This name will be used to correlate alternate paths to the same 
   device.  The format for the iSCSI names MUST use existing naming 
   authorities, to avoid creating new central administrative tasks.  An iSCSI 
   name SHOULD be a human readable string in an international character set 
   encoding. 
    
   Note that LU names are discovered through SCSI-level inquiries, and are 
   not just for Fibre Channel.  There is nothing to prevent iSCSI (or 
   parallel SCSI) from implementing the LU WWN.  As such, this is outside the 
   scope of the iSCSI protocol specification. 
    
   Standard internet lookup services SHOULD be used to resolve names. 
   For example, Domain Name Services (DNS) MAY be used to resolve the 
   <hostname> portion of the URL to one or multiple IP addresses.  When a 
   hostname resolves to multiple addresses, these addresses should be 
   equivalent for functional (possibly not performance) purposes.  This means 
   that the addresses can be used interchangeably as long as performance 
   isnĖt a concern.  For example, the same set of SCSI targets MUST be 
   accessible from each of these addresses. 
    
   An iSCSI device naming scheme MUST interact correctly with the proposed 
   SCSI security architecture [99-245r9].  Particular attention must be 
   directed to the proxy naming architecture defined by the new security 
   model.  In this new model,  a host is identified by an Access ID, and SCSI 
   Logical Unit Numbers (LUNs) can be mapped in a manner that gives each 
   AccessID a unique LU map.  Thus, a given LU within a target may be 
   addressed by different LUNs. 
    
  7.2. Discovery 
    
   iSCSI MUST have no impact on the use of current IP network discovery 
   techniques.  Network management platforms discover IP addresses and have 
   various methods of probing the services available through these IP 
   addresses.  An iSCSI service should be evident using similar techniques. 
  
Krueger             Informational - Exp. May 2001                  17 
               iSCSI Reqmnts and Design Considerations      Nov. 2000 
 
 
    
   The iSCSI specifications MUST provide some means of determining whether an 
   iSCSI service is available through an IP address.  It is expected that 
   iSCSI will be a point of service in a host, just as SNMP, etc are points 
   of services, associated with a well known port number. 
    
   SCSI protocol-dependent techniques SHOULD be used for further discovery 
   beyond the iSCSI layer.  Discovery is a complex, multi-layered process.  
   The SCSI protocol specifications provide specific commands for discovering 
   LUs and the commands associated with this process will also work over 
   iSCSI.  
    
   The iSCSI protocol MUST provide a method of discovering, given an IP end 
   point on its well-known port, the list of SCSI targets available to the 
   requestor.  The use of this discovery service MUST be optional. 
    
   Further discovery guidelines are outside the scope of this document and 
   may be addressed in separate Informational drafts. 
 
8. Internet Accessibility 
  8.1. Denial of Service 
    
   As with all services, the denial of service by either incorrect 
   implementations or malicious agents is always a concern.  All aspects of 
   the iSCSI protocol SHOULD be scrutinized for potential denial of service 
   issues, and guarded against as much as possible. 
    
  8.2. Firewalls and Proxy servers 
    
   A URL syntax for iSCSI resource names allows an initiator to address an 
   iSCSI target device both directly and through an iSCSI proxy server. 
    
   The iSCSI protocols use of IP addressing and TCP port numbers MUST be 
   firewall friendly. This means that all connection requests should normally 
   be addressed to a specific, well-known TCP port.  That way, firewalls can 
   filter based on source and destination IP addresses, and destination 
   (target) port number.  Additional TCP connections would require different 
   source port numbers (for uniqueness), but could be opened after a security 
   dialogue on the control channel. 
    
   ItĖs important that iSCSI operate through a firewall to provide a possible 
   means of defending against Denial of Service (DoS) assaults from less-
   trusted areas of the network.  It is assumed that a firewall will have 
   much greater processing power for dismissing bogus connection requests 
   than end nodes. 
    
  8.3. Congestion Control and Transport Selection 
    
  
Krueger             Informational - Exp. May 2001                  18 
               iSCSI Reqmnts and Design Considerations      Nov. 2000 
 
 
   The iSCSI protocol MUST be a good network citizen with proven congestion 
   control (as defined in RFC 2309). In addition, iSCSI implementations MUST 
   NOT use multiple connections as a means to avoid transport-layer 
   congestion control. 
    
9. Virtualization 
    
   Virtualization of targets and LUNs is generally handled by intelligent 
   gateways, storage controllers, or other devices.  Many vendors, especially 
   those that build storage devices, include very advanced virtualization 
   features that are beyond the scope of a SCSI transport layer to define, 
   and are usually closely guarded as intellectual property. 
    
   Requiring the iSCSI protocol to work within an environment that includes 
   proxies and gateways (see earlier requirements) will provide a SCSI 
   transport that will enable vendors to add their own virtualization 
   features without breaking the protocol or causing interoperability 
   problems. 
    
10. Definitions 
 
   Certain definitions are offered here, with references to the original 
   document where applicable, in order to clarify the discussion of 
   requirements.  Definitions without references are the work of the authors 
   and reviewers of this document. 
    
   Logical Unit (LU): A target-resident entity that implements a device model 
   and executes SCSI commands sent by an application client [SAM-2, sec. 
   3.1.50, p. 7]. 
    
   Logical Unit Number (LUN): A 64-bit identifier for a logical unit [SAM-2, 
   sec. 3.1.52, p. 7]. 
    
   SCSI Device:  A device that is connected to a service delivery subsystem 
   and supports a SCSI application protocol [SAM-2, sec. 3.1.78, p. 9]. 
    
   Service Delivery Port (SDP): A device-resident interface used by the 
   application client, device server, or task manager to enter and retrieve 
   requests and responses from the service delivery subsystem.  Synonymous 
   with port (SAM-2 sec. 3.1.61) [SAM-2, sec. 3.1.89, p. 9]. 
    
   Target: A SCSI device that receives a SCSI command and directs it to one 
   or more logical units for execution [SAM-2 sec. 3.1.97, p. 10]. 
    
   Task: An object within the logical unit representing the work associated 
   with a command or a group of linked commands [SAM-2, sec. 3.1.98, p. 10]. 
    
   Transaction: A cooperative interaction between two objects, involving the 
   exchange of information or the execution of some service by one object on 
   behalf of the other [SAM-2, sec. 3.1.109, p. 10].  [A transaction seems to 
   be a smaller unit than a task.] 
  
Krueger             Informational - Exp. May 2001                  19 
               iSCSI Reqmnts and Design Considerations      Nov. 2000 
 
 
    
11. References 
    
   1  Bradner, S., "The Internet Standards Process -- Revision 3", BCP 9, RFC 
      2026, October 1996. 
    
   2  Bradner, S., "Key words for use in RFCs to Indicate Requirement 
      Levels", BCP 14, RFC 2119, March 1997 
    
   3  [SAM-2] ANSI NCITS.  Weber, Ralph O., editor.  SCSI Architecture Model
      -2 (SAM-2).  T10 Project 1157-D.  rev 13, 22 Mar 2000. 

   4  [SPC-2] ANSI NCITS.  Weber, Ralph O., editor.  SCSI Primary Commands -                                                               - 
      2 (SPC-2).  T10 Project 1236-D.  rev 18, 21 May 2000.
      
   5  [CAM-3] ANSI NCITS.  Dallas, William D., editor.  Information 
      Technology - Common Access Method - 3 (CAM-3)).  X3T10 Project 990D.  
      rev 3, 16 Mar 1998.
       
   6  [99-245r8] Hafner, Jim.  A Detailed Proposal for Access Controls.  
      T10/99-245 revision 8, 26 Apr 2000.
       
   7  [SPI-X] ANSI NCITS.  SCSI Parallel Interface - X.
    
   8  [FCP] ANSI NCITS.  SCSI-3 Fibre Channel Protocol [ANSI X3.269:1996].
    
   9  [FCP-2] ANSI NCITS.  SCSI-3 Fibre Channel Protocol - 2 [T10/1144-D].
    
   10 Paxon, V. End-to-end internet packet dynamics, IEEE Transactions on 
      Networking 7,3 (June 1999) pg 277-292.
       
   11 Stone J., Partridge, C. When the CRC and TCP checksum disagree, ACM 
      Sigcomm (Sept. 2000).
       
   12 [RFC1783] Berners-Lee, t., et.al.,"Uniform Resource Locators", RFC 
      1783, December 1994. 
                                             
12. Acknowledgements 
    
   Special thanks to Julian Satran, IBM and David Black, EMC for their 
   extensive review comments. 
    
13. Author's Addresses 
    
   Address comments to: 
    
   Marjorie Krueger 
   Hewlett-Packard Corporation 
   8000 Foothills Blvd 
   Roseville, CA 95747-5668, USA 
   Phone: +1 916 785-2656 
   Email: marjorie_krueger@hp.com 
    
  
Krueger             Informational - Exp. May 2001                  20 
               iSCSI Reqmnts and Design Considerations      Nov. 2000 
 
 
   Randy Haagens 
   Hewlett-Packard Corporation 
   8000 Foothills Blvd 
   Roseville, CA 95747-5668, USA 
   Phone: +1 916 785-4578 
   Email: Randy_Haagens@hp.com 
    
   Costa Sapuntzakis 
   Cisco Systems, Inc. 
   170 W. Tasman Dr. 
   San Jose, CA 95134, USA 
   Phone: +1 408 525-5497 
   Email: csapuntz@cisco.com 
    
   Mark Bakke 
   Cisco Systems, Inc. 
   6450 Wedgwood Road 
   Maple Grove, MN 55311 
   Phone: +1 763 398-1054 
   Email: mbakke@cisco.com
  
Krueger             Informational - Exp. May 2001                  21 
               iSCSI Reqmnts and Design Considerations      Nov. 2000 
 
 
    
Full Copyright Statement 
 
   "Copyright (C) The Internet Society (date). All Rights Reserved. This 
   document and translations of it may be copied and furnished to others, and 
   derivative works that comment on or otherwise explain it or assist in its 
   implementation may be prepared, copied, published and distributed, in 
   whole or in part, without restriction of any kind, provided that the above 
   copyright notice and this paragraph are included on all such copies and 
   derivative works. However, this document itself may not be modified in any 
   way, such as by removing the copyright notice or references to the 
   Internet Society or other Internet organizations, except as needed for the 
   purpose of developing Internet standards in which case the procedures for 
   copyrights defined in the Internet Standards process must be followed, or 
   as required to translate it into 
    
    
    
 
  
Krueger             Informational - Exp. May 2001                  22

PAFTECH AB 2003-20262026-04-19 19:02:59