亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc4018.txt

?? 一個學習iSCSI協議的文檔
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
   of the SLPv2 [RFC2608] security model.

   Once a target or management server is discovered, authentication and
   authorization are handled by the iSCSI protocol, or by the management
   server's protocol.  It is the responsibility of the providers of
   these services to ensure that an inappropriately advertised or
   discovered service does not compromise their security.

   When no security is used for SLPv2, there is a risk of distribution
   of false discovery information.  The primary countermeasure for this
   risk is authentication.  When this risk is a significant concern,
   IPsec SAs and iSCSI in-band authentication SHOULD be used for iSCSI
   traffic subject to this risk to ensure that iSCSI traffic only flows
   between endpoints that have participated in IKE authentication and
   iSCSI in-band authentication.  For example, if an attacker
   distributes discovery information falsely claiming that it is an
   iSCSI target, it will lack the secret information necessary to
   complete IKE authentication or iSCSI in-band authentication
   successfully and therefore will be prevented from falsely sending or
   receiving iSCSI traffic.

   A risk remains of a denial of service attack based on repeated use of
   false discovery information that will cause initiation of IKE
   negotiation.  The countermeasures for this are administrative
   configuration of each iSCSI Target to limit the peers  it is willing
   to communicate with (i.e., by IP address range and/or DNS domain),
   and maintenance of a negative authentication cache to avoid
   repeatedly contacting an iSCSI Target that fails to authenticate.
   These three measures (i.e., IP address range limits, DNS domain
   limits, negative authentication cache) MUST be implemented.

   The auth-name, auth-addr, auth-cred, and boot-list attributes
   comprise security policy information.  When these are distributed,
   IPsec MUST be implemented.





Bakke & Hufferd             Standards Track                    [Page 18]

RFC 4018                    iSCSI and SLPv2                   April 2005


6.1.  Security Implementation

   Security for SLPv2 in an IP storage environment is specified in
   [RFC3723].  IPsec is mandatory-to-implement for IPS clients and
   servers.  Thus, all IP storage clients, including those invoking SLP,
   can be assumed to support IPsec.  SLP servers, however, cannot be
   assumed to implement IPsec, since there is no such requirement in
   standard SLP.  In particular, SLP Directory Agents (DA) may be
   running on machines other than those running the IPS protocols.

   IPsec SHOULD be implemented for SLPv2 as specified in [RFC3723]; this
   includes ESP with a non-null transform to provide both authentication
   and confidentiality.

   When SLPv2 can be used to distribute auth-name, auth-addr, auth-cred,
   and boot-list information (see section 5.2 above), IPsec MUST be
   implemented, as these items are considered sensitive security policy
   information.  If IPsec is not implemented, auth-name, auth-addr,
   auth-cred, and boot-list information MUST NOT be distributed via
   SLPv2 and MUST NOT be used if discovered via SLPv2.

   Because the IP storage services have their own authentication
   capabilities when located, SLPv2 authentication is OPTIONAL to
   implement and use (as discussed in more detail in [RFC3723]).

7.  IANA Considerations

   This document describes three SLP Templates.  They have been reviewed
   and approved by the IESG and registered in the IANA's "SVRLOC
   Templates" registry.  This process is described in the IANA
   Considerations section of [RFC2609].

8.  Summary

   This document describes how SLP can be used by iSCSI initiators to
   find iSCSI targets and storage management servers.  Service type
   templates for iSCSI targets and storage management servers are
   presented.

9.  Normative References

   [RFC2608]   Guttman, E., Perkins, C., Veizades, J., and M. Day,
               "Service Location Protocol, Version 2", RFC 2608, June
               1999.

   [RFC2609]   Guttman, E., Perkins, C., and J. Kempf, "Service
               Templates and Service: Schemes", RFC 2609, June 1999.




Bakke & Hufferd             Standards Track                    [Page 19]

RFC 4018                    iSCSI and SLPv2                   April 2005


   [RFC2119]   Bradner, S., "Key words for use in RFCs to Indicate
               Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC3491]   Hoffman, P. and M. Blanchet, "Nameprep: A Stringprep
               Profile for Internationalized Domain Names (IDN)", RFC
               3491, March 2003.

   [RFC3513]   Hinden, R. and S. Deering, "Internet Protocol Version 6
               (IPv6) Addressing Architecture", RFC 3513, April 2003.

   [RFC3720]   Satran, J., Meth, K., Sapuntzakis, C., Chadalapaka, M.,
               and E. Zeidner, "Internet Small Computer Systems
               Interface (iSCSI)", RFC 3720, April 2004.

   [RFC3722]   Bakke, M., "String Profile for Internet Small Computer
               Systems Interface (iSCSI) Names", RFC 3722, April 2004.

   [RFC3723]   Aboba, B., Tseng, J., Walker, J., Rangan, V., and F.
               Travostino, "Securing Block Storage Protocols over IP",
               RFC 3723, April 2004.

10.  Informative References

   [RFC2614]   Kempf, J. and E. Guttman, "An API for Service Location",
               RFC 2614, June 1999.

   [SAM2]      ANSI T10.  "SCSI Architectural Model 2", March 2000.

   [RFC3721]   Bakke, M., Hafner, J., Hufferd, J., Voruganti, K., and M.
               Krueger, "Internet Small Computer Systems Interface
               (iSCSI) Naming and Discovery", RFC 3721, April 2004.

   [ISNS]      Tseng, J., Gibbons, K., Travostino, F., Du Laney, C. and
               J.  Souza, "Internet Storage Name Service", Work in
               Progress, February 2004.

   [BOOT]      Sarkar, P., Missimer, D. and C. Sapuntzakis,  "A Standard
               for Bootstrapping Clients using the iSCSI Protocol", Work
               in Progress, March 2004.

   [RFC3105]   Kempf, J. and G. Montenegro, "Finding an RSIP Server with
               SLP", RFC 3105, October 2001.









Bakke & Hufferd             Standards Track                    [Page 20]

RFC 4018                    iSCSI and SLPv2                   April 2005


11.  Acknowledgements

   This document was produced by the iSCSI Naming and Discovery team,
   including Joe Czap, Jim Hafner, John Hufferd, and Kaladhar Voruganti
   (IBM), Howard Hall (Pirus), Jack Harwood (EMC), Yaron Klein (Sanrad),
   Marjorie Krueger (HP), Lawrence Lamers (San Valley), Todd Sperry
   (Adaptec), and Joshua Tseng (Nishan).  Thanks also to Julian Satran
   (IBM) for suggesting the use of SLP for iSCSI discovery, and to Matt
   Peterson (Caldera) and James Kempf (Sun) for reviewing the document
   from an SLP perspective.









































Bakke & Hufferd             Standards Track                    [Page 21]

RFC 4018                    iSCSI and SLPv2                   April 2005


Authors' Addresses

   Mark Bakke
   Cisco Systems, Inc.
   7900 International Drive, Suite 400
   Bloomington, MN
   USA 55425

   EMail: mbakke@cisco.com


   Kaladhar Voruganti
   IBM Almaden Research Center
   650 Harry Road
   San Jose, CA 95120

   EMail: kaladhar@us.ibm.com


   John L. Hufferd
   IBM Storage Systems Group
   5600 Cottle Road
   San Jose, CA 95193

   Phone: +1 408 997-6136
   EMail: jlhufferd@comcast.net


   Marjorie Krueger
   Hewlett-Packard Corporation
   8000 Foothills Blvd
   Roseville, CA 95747-5668, USA

   Phone: +1 916 785-2656
   EMail: marjorie_krueger@hp.com


   Todd Sperry
   Adaptec, Inc.
   691 South Milpitas Boulevard
   Milpitas, Ca. 95035

   Phone: +1 408 957-4980
   EMail: todd_sperry@adaptec.com







Bakke & Hufferd             Standards Track                    [Page 22]

RFC 4018                    iSCSI and SLPv2                   April 2005


Full Copyright Statement

   Copyright (C) The Internet Society (2005).

   This document is subject to the rights, licenses and restrictions
   contained in BCP 78, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at ietf-
   ipr@ietf.org.

Acknowledgement

   Funding for the RFC Editor function is currently provided by the
   Internet Society.







Bakke & Hufferd             Standards Track                    [Page 23]


?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
eeuss鲁片一区二区三区| 同产精品九九九| 国内精品国产成人国产三级粉色| 欧美最猛性xxxxx直播| 亚洲欧美国产三级| 91久久精品一区二区| 一区二区三区中文在线| 日本精品裸体写真集在线观看 | 中文字幕一区二区视频| 99免费精品视频| 一区二区视频在线| 欧美亚洲丝袜传媒另类| 久久9热精品视频| 国产视频一区在线播放| 91视频免费观看| 亚洲第一久久影院| 精品黑人一区二区三区久久| 懂色中文一区二区在线播放| 自拍偷拍亚洲欧美日韩| 欧美精品第1页| 国产精品亚洲专一区二区三区 | 日本一区二区三区四区| av在线免费不卡| 亚洲一二三级电影| 日日噜噜夜夜狠狠视频欧美人 | 国产日韩精品久久久| 成人午夜激情在线| 亚洲超碰精品一区二区| 欧美哺乳videos| 91在线观看一区二区| 日韩不卡手机在线v区| 国产日韩精品一区二区三区| 欧美中文字幕久久| 国产精品乡下勾搭老头1| 亚洲欧美一区二区在线观看| 777午夜精品视频在线播放| 国产精品1区2区| 亚洲6080在线| 国产精品免费免费| 欧美一区二区三区的| 国产99久久久国产精品| 日韩主播视频在线| 国产精品毛片久久久久久久| 91精品国产91久久久久久最新毛片| 丁香婷婷综合色啪| 毛片一区二区三区| 亚洲综合男人的天堂| 国产欧美日韩视频一区二区| 7777精品伊人久久久大香线蕉超级流畅 | 欧美tickle裸体挠脚心vk| 色婷婷精品久久二区二区蜜臂av | 欧美日韩在线不卡| 成人av在线一区二区| 精一区二区三区| 亚洲第一电影网| 亚洲黄色小视频| 亚洲少妇30p| 国产精品污污网站在线观看| 精品入口麻豆88视频| 欧美日韩一区二区三区在线| 91网站最新网址| 成人听书哪个软件好| 久久99精品国产.久久久久| 亚洲成人免费电影| 亚洲精选视频在线| 国产精品美女久久久久久2018| 久久综合五月天婷婷伊人| 欧美另类变人与禽xxxxx| 欧美性一级生活| 欧美自拍偷拍午夜视频| 色综合夜色一区| 一本一道久久a久久精品| 99久久综合99久久综合网站| 不卡影院免费观看| 成人av网站在线观看免费| 国产成人免费视频网站 | 亚洲国产精品麻豆| 亚洲人成精品久久久久久 | 午夜激情久久久| 亚洲国产精品一区二区久久| 午夜精品免费在线| 亚洲午夜久久久久中文字幕久| 亚洲综合免费观看高清完整版 | 成人精品电影在线观看| 成人午夜精品在线| 91麻豆swag| 在线欧美日韩国产| 正在播放一区二区| 精品欧美一区二区三区精品久久| 欧美一区二区高清| 亚洲精品一区二区三区福利 | 亚洲日本一区二区| 亚洲激情中文1区| 午夜激情一区二区| 精品中文av资源站在线观看| 国产一区二区在线看| 成人毛片老司机大片| 99精品久久只有精品| 色拍拍在线精品视频8848| 精品视频免费看| 日韩精品一区二区三区蜜臀| 久久久午夜精品理论片中文字幕| 国产精品视频在线看| 一区二区在线免费观看| 日本亚洲一区二区| 国产资源在线一区| 99久久精品国产麻豆演员表| 欧美色欧美亚洲另类二区| 精品久久国产字幕高潮| 中文乱码免费一区二区 | 日本不卡123| 国产乱码精品1区2区3区| 91日韩精品一区| 在线电影院国产精品| 久久―日本道色综合久久| 亚洲美女少妇撒尿| 精品在线播放免费| 91麻豆swag| 久久影院视频免费| 一区二区三区免费在线观看| 久久99久久精品欧美| 北条麻妃一区二区三区| 制服.丝袜.亚洲.中文.综合| 国产精品女同互慰在线看| 首页亚洲欧美制服丝腿| 不卡一区二区三区四区| 日韩欧美国产1| 一区二区三区在线高清| 精品一区二区三区在线播放 | 日韩色在线观看| 中文字幕佐山爱一区二区免费| 免费成人在线网站| 91美女片黄在线观看| 久久综合五月天婷婷伊人| 亚洲成人av福利| 成人精品在线视频观看| 日韩三级中文字幕| 亚洲国产另类精品专区| a在线欧美一区| 26uuu成人网一区二区三区| 午夜私人影院久久久久| 成人avav影音| 久久精品亚洲麻豆av一区二区| 首页亚洲欧美制服丝腿| 在线观看网站黄不卡| 国产精品久久久久毛片软件| 国产乱国产乱300精品| 日韩美女视频在线| 午夜激情久久久| 精品污污网站免费看| 一区二区三区色| av在线综合网| 国产精品第五页| 粉嫩13p一区二区三区| 久久精品亚洲麻豆av一区二区| 毛片一区二区三区| 欧美电影免费观看高清完整版在线观看| 一区二区视频在线看| 91久久精品一区二区| 亚洲四区在线观看| 9i在线看片成人免费| 中文在线一区二区| 成人av电影免费观看| 中文字幕在线视频一区| 成人一区在线看| 国产精品国产三级国产aⅴ原创| 久久99精品国产.久久久久| 欧美成人官网二区| 韩日av一区二区| 日韩欧美国产麻豆| 韩国av一区二区三区在线观看| 日韩欧美高清在线| 国产乱色国产精品免费视频| 国产婷婷色一区二区三区| a美女胸又www黄视频久久| 亚洲欧美乱综合| 91成人在线免费观看| 亚洲成人午夜影院| 69成人精品免费视频| 久久9热精品视频| 国产拍揄自揄精品视频麻豆| 岛国精品在线观看| 亚洲人成人一区二区在线观看| 在线免费亚洲电影| 免费视频一区二区| 久久网这里都是精品| 成人一区二区视频| 亚洲影院免费观看| 欧美一区二区三区男人的天堂| 精品在线亚洲视频| 国产精品久久久久影院亚瑟 | 久久免费精品国产久精品久久久久 | 欧美国产禁国产网站cc| 色综合久久久久综合体桃花网| 亚洲图片自拍偷拍| 精品国精品国产| 97久久超碰国产精品| 日韩电影免费在线看| 久久久电影一区二区三区| av中文字幕不卡|