Shopping Cart

No products in the cart.

BSI 19/30387128 DC:2019 Edition

$24.66

BS ISO/IEC 14776-481. Information technology. Small computer system interface (SCSI) – Part 481. Security. Features for SCSI Commands (SFSC)

Published By Publication Date Number of Pages
BSI 2019 149
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
5 Contents
8 Figures
9 Tables
12 FOREWORD
14 INTRODUCTION
SCSI standards family
15 1 Scope
2 Normative references
18 3 Terms and definitions, symbols, abbreviations, and conventions
3.1 Terms and definitions
28 3.2 Abbreviations and symbols
3.2.1 Abbreviations
30 3.2.2 Symbols
3.2.3 Mathematical operators
3.3 Keywords
31 3.4 Conventions
32 3.5 Numeric and character conventions
3.5.1 Numeric conventions
33 3.5.2 Units of measure
34 3.5.3 Byte encoded character strings conventions
3.6 Bit and byte ordering
36 4 Security features model common to all device types
4.1 Security features for SCSI devices
4.1.1 Security associations
4.1.1.1 Principles of SAs
37 4.1.1.2 SA parameters
39 4.1.1.3 Creating an SA
40 4.1.2 Key derivation functions
4.1.2.1 KDFs overview
4.1.2.2 IKEv2-based iterative KDF
41 4.1.2.3 HMAC-based KDFs
42 4.1.2.4 AES-XCBC-PRF-128 IKEv2-based iterative KDF
43 4.1.3 Using IKEv2-SCSI to create an SA
4.1.3.1 Overview
46 4.1.3.2 IKEv2-SCSI Protocol summary
49 4.1.3.3 IKEv2-SCSI Authentication
4.1.3.3.1 Overview
50 4.1.3.3.2 Pre-shared key authentication
4.1.3.3.3 Digital signature authentication
4.1.3.3.3.1 Overview
51 4.1.3.3.3.2 Certificates and digital signature authentication
4.1.3.3.3.3 Example of certificate use for digital signature authentication
52 4.1.3.3.3.4 Handling of the Certificate Request payload and the Certificate payload
4.1.3.3.4 Constraints on skipping the Authentication step
54 4.1.3.4 Summary of IKEv2-SCSI shared keys nomenclature and shared key sizes
55 4.1.3.5 Device Server Capabilities step
57 4.1.3.6 IKEv2-SCSI Key Exchange step
4.1.3.6.1 Overview
4.1.3.6.2 Key Exchange step SECURITY PROTOCOL OUT command
58 4.1.3.6.3 Key Exchange step SECURITY PROTOCOL IN command
59 4.1.3.6.4 Key Exchange step completion
4.1.3.6.5 After the Key Exchange step
4.1.3.7 IKEv2-SCSI Authentication step
4.1.3.7.1 Overview
60 4.1.3.7.2 Authentication step SECURITY PROTOCOL OUT command
61 4.1.3.7.3 Authentication step SECURITY PROTOCOL IN command
62 4.1.3.8 Generating shared keys
4.1.3.8.1 Overview
63 4.1.3.8.2 Generating shared keys when the Authentication step is skipped
4.1.3.8.3 Generating shared keys when the Authentication step is processed
4.1.3.8.4 Initializing shared key generation
4.1.3.8.4.1 Initializing for SA creation shared key generation
64 4.1.3.8.4.2 Initializing for generation of shared keys used by the created SA
4.1.3.8.5 Generating shared keys used for SA management
65 4.1.3.8.6 Generating shared keys for use by the created SA
66 4.1.3.9 IKEv2-SCSI SA generation
67 4.1.3.10 Abandoning an IKEv2-SCSI CCS
68 4.1.3.11 Deleting an IKEv2-SCSI SA
4.1.4 Security progress indication
69 4.1.5 ESP-SCSI encapsulations for parameter data
4.1.5.1 Overview
4.1.5.2 ESP-SCSI required inputs
70 4.1.5.3 ESP-SCSI data format before encryption and after decryption
71 4.1.5.4 ESP-SCSI outbound data descriptors
4.1.5.4.1 Overview
72 4.1.5.4.2 ESP-SCSI CDBs or Data-Out Buffer parameter lists including a descriptor length
4.1.5.4.2.1 Initialization vector absent
73 4.1.5.4.2.2 Initialization vector present
75 4.1.5.4.3 ESP-SCSI Data-Out Buffer parameter lists for externally specified descriptor length
4.1.5.4.3.1 Initialization vector absent
76 4.1.5.4.3.2 Initialization vector present
4.1.5.5 ESP-SCSI Data-In Buffer parameter data descriptors
4.1.5.5.1 Overview
77 4.1.5.5.2 ESP-SCSI Data-In Buffer parameter data including a descriptor length
4.1.5.5.2.1 Initialization vector absent
79 4.1.5.5.2.2 Initialization vector present
80 4.1.5.5.3 ESP-SCSI Data-In Buffer parameter data for externally specified descriptor length
4.1.5.5.3.1 Initialization vector absent
81 4.1.5.5.3.2 Initialization vector present
82 4.1.6 Security algorithm codes
84 4.2 Secure random numbers
85 5 Security protocol parameters for all device types
5.1 Security protocol information description
5.1.1 Overview
5.1.2 CDB description
86 5.1.3 Supported security protocols list description
87 5.1.4 Certificate data description
5.1.4.1 Certificate overview
5.1.4.2 Public Key certificate description
5.1.4.3 Attribute certificate description
88 5.1.5 Security compliance information description
5.1.5.1 Security compliance information overview
89 5.1.5.2 Compliance descriptor overview
90 5.1.5.3 FIPS 140 compliance descriptor
91 5.2 SA creation capabilities
5.2.1 Overview
5.2.2 SA creation capabilities CDB description
92 5.2.3 SA creation capabilities parameter data formats
5.2.3.1 Supported device server capabilities formats parameter data format
93 5.2.3.2 IKEv2-SCSI device server capabilities parameter data format
5.3 IKEv2-SCSI
5.3.1 Overview
94 5.3.2 IKEv2-SCSI SECURITY PROTOCOL IN CDB description
95 5.3.3 IKEv2-SCSI SECURITY PROTOCOL OUT CDB description
96 5.3.4 IKEv2-SCSI parameter data format
103 5.3.5 IKEv2-SCSI payloads
5.3.5.1 IKEv2-SCSI payload format
104 5.3.5.2 No Next payload
105 5.3.5.3 Key Exchange payload
106 5.3.5.4 Identification – Application Client payload and Identification – Device Server payload
107 5.3.5.5 Certificate payload
108 5.3.5.6 Certificate Request payload
109 5.3.5.7 Authentication payload
111 5.3.5.8 Nonce payload
112 5.3.5.9 Notify payload
113 5.3.5.10 Delete payload
114 5.3.5.11 Encrypted payload
5.3.5.11.1 Combined mode encryption
115 5.3.5.11.2 Encrypted payload introduction
117 5.3.5.11.3 IKEv2-SCSI AAD
118 5.3.5.11.4 Processing a received Encrypted payload
120 5.3.5.12 IKEv2-SCSI SA Creation Capabilities payload
121 5.3.5.13 IKEv2-SCSI SA Cryptographic Algorithms payload
123 5.3.5.14 IKEv2-SCSI SAUT Cryptographic Algorithms payload
124 5.3.5.15 IKEv2-SCSI Timeout Values payload
125 5.3.6 IKEv2-SCSI cryptographic algorithm descriptors
5.3.6.1 Overview
127 5.3.6.2 ENCR IKEv2-SCSI cryptographic algorithm descriptor
129 5.3.6.3 PRF IKEv2-SCSI cryptographic algorithm descriptor
131 5.3.6.4 INTEG IKEv2-SCSI cryptographic algorithm descriptor
132 5.3.6.5 D-H IKEv2-SCSI cryptographic algorithm descriptor
134 5.3.6.6 IKEv2-SCSI authentication algorithm IKEv2-SCSI cryptographic algorithm descriptor
137 5.3.7 Errors in IKEv2-SCSI security protocol commands
139 5.3.8 Errors in IKEv2-SCSI security protocol parameter data
5.3.8.1 Overview
5.3.8.2 Errors with high denial of service attack potential
140 5.3.8.3 Errors with low denial of service attack potential
5.3.9 Translating IKEv2 errors
142 Annex A
Security goals and threat model
A.1 Introduction
A.2 Security goals
143 A.3 Threat model
A.4 Types of attacks
144 A.5 SCSI security considerations
145 Annex B
Variations between this document and equivalent security protocols
B.1 IKEv2 protocol details and variations for IKEv2-SCSI
148 B.2 ESP protocol details and variations for ESP-SCSI
149 BIBLIOGRAPHY
BSI 19/30387128 DC
$24.66