Storage Area Networks: Performance and Security

24
Storage Area Networks: Performance and Security Presented by Matthew Packard July 27, 2003

Transcript of Storage Area Networks: Performance and Security

Page 1: Storage Area Networks: Performance and Security

Storage Area Networks: Performance and Security

Presented by Matthew Packard

July 27, 2003

Page 2: Storage Area Networks: Performance and Security

SAN Architecture - Definition & DAS Limitations

❖ Storage Area Network (SAN)

✦ universal storage connectivity

✧ free from interconnection implementation

✦ dedicated storage network

✧ reduces overhead on data networks

❖ Directly Attached Storage (DAS)

✦ widely used - host centric storage

✦ high overhead on data networks

✦ failover/clustering more difficult and expensive

DAS Storage Model

NAT Slide 2

Page 3: Storage Area Networks: Performance and Security

SAN Architecture (Cont) - Storage Design & Applications

❖ Storage and data traffic isolation

✦ out of band signaling

❖ Based on high capacity, redundant links

❖ On-the-fly storage allocation

✦ plug, configure, mount

❖ Centralized backups

✦ fast, one stop repository

❖ Easy clustering

✦ all hosts see same data, same view

❖ Easy failover

✦ with volume managers, swap mounts and run

SAN Storage Model

NAT Slide 3

Page 4: Storage Area Networks: Performance and Security

SAN Architecture (Cont) - SAN vs NAS

❖ Network Attached Storage (NAS)

✦ similar to SAN

✧ direct network connection

✦ uses TCP/IP protocol

✦ internal filesystem

✧ shared to remote hosts (NFS/CIFS)

❖ SAN

✦ direct network connection

✦ uses FC with encapsulated SCSI commands

✦ no internal filesystem

✦ relies on controlling host for representation

NAT Slide 4

Page 5: Storage Area Networks: Performance and Security

SAN Architecture (Cont) - Interconnection: Fibre Channel

❖ Fast: 100Mb/s - 3.2Gb/s up to 10km

❖ FC de facto standard

✦ direct connect (N Port)

✦ arbitrated loop (FL Port)

✧ FC-AL giant bus

✦ switched fabric (F Port)

✧ fast

✦ bridging for SCSI devices

✦ FC-0 (physical)

✦ FC-1 (error-free conditioning)

✦ FC-2 (most important)

✧ framing, flow control, segmentation, errors

✦ FC-3 (striping)

✦ FC-4 (ULP)

Upper Level Protocol MappingFC−4

FC−3

IPULPs SCSI IPI−3 HIPPI SBCCS ATM/AAL5

Common Services

N_Port to N_Port

FC−2

FC−AL

FC−1

FC−0

Signaling ProtocolLink Service

Arbitrated Loop Functions

Transmission Protocol

Physical InterfaceMedia

Fibre Channel Hierarchy

NAT Slide 5

Page 6: Storage Area Networks: Performance and Security

SAN Architecture (Cont) - Interconnection: iSCSI

❖ SCSI over IP

❖ Slow, since it uses software stack conversions

❖ Best for sites using existing wiring plants and long distance storage

NAT Slide 6

Page 7: Storage Area Networks: Performance and Security

SAN Architecture (Cont) - Interconnection: Infiniband

❖ Intel led

✦ adds ASIC support for SAN technology in processors

❖ x86 OSes have SAN support built-in for little cost

✦ Linux, Solaris, and Windows

❖ Replacement for PCI

❖ SAN and NAS integration with VIA

NAT Slide 7

Page 8: Storage Area Networks: Performance and Security

SAN Performance - Filesystem Performance: UFS

❖ UNIX Filesystem (UFS)

✦ support under Solaris, Linux, BSD, AIX, HP-UX

❖ Metadata logging

✦ transaction rollback on mid-write failure

✦ good for large volumes - no fscking

❖ Block allocation

✦ disk block allocated per requested data block

Data

Block Numbers

Block Allocation

Block Numbers

Extent Allocation

Data

Data

Block vs Extent Allocation

NAT Slide 8

Page 9: Storage Area Networks: Performance and Security

SAN Performance (Cont) - Filesystem Performance: VxFS

❖ Another UNIX filesystem

❖ Part of Veritas suite - Volume Manager add on

❖ Full data and metadata logging

✦ data can be rolled back or forward with logs

❖ Extent allocation

✦ series of blocks allocated per requested write

✦ blocks accessed as offset from master block

✦ slower than UFS for heavy random I/O

NAT Slide 9

Page 10: Storage Area Networks: Performance and Security

SAN Performance (Cont) - Hardware RAID

❖ Redundant Array of Inexpensive Drives (RAID)

❖ Performed on storage array controller

✦ very fast, depending on RAID type

❖ Various RAID levels (0, 1, 3, 4, 5, 6, 0+1, 1+0)

✦ no one better than another

✦ based on performance and failure resilience tolerances

✦ RAID-0 (striping, no failure tolerance, fast)

✦ RAID-1 (mirroring, can lose one drive, fast reads)

✦ RAID-5 (distributed parity, one drive, fast reads)

✦ RAID-0+1 (mirrored stripes, one drive, fast r/w)

✦ RAID-1+0 (striped mirrors, one drive, fastest r/w)

Controller

Disk A Disk B Disk C

0 1 2

3 4 5

6 7 8

9 10 11

Blocks Written Across All Disks First

Blo

cks

Writ

ten

Acr

oss

A S

ingl

e D

isk

Sec

ond

RAID-0: Disk Striping

Controller

Disk A Disk B

0

3

1

0

1

22

3

=

Duplicate Blocks Written to Both Disks First

Blo

cks

Writ

ten

Acr

oss

Sam

e D

isk

Sec

ond

RAID-1: Disk Mirroring

Controller

Disk A Disk B Disk C Disk D

0−0 0−1 0−2 Parity 0

1−0 1−1

2−0

Parity 1 1−2

Parity 2 2−1 2−2

Parity 3 3−0 3−1 3−2

Blo

cks

Writ

ten

Acr

os S

ame

Dis

k S

econ

d

Blocks Written Across All Disks First With Parity Block Offset

RAID-5: Disk Striping w/ Dist. Parity

NAT Slide 10

Page 11: Storage Area Networks: Performance and Security

SAN Performance (Cont) - Volume Management

❖ RAID configuration through software

❖ Works on host, rather than on storage

❖ Slower than hardware RAID, but more options

✦ tighter volume creation parameters

✦ cluster support

✦ failover support

NAT Slide 11

Page 12: Storage Area Networks: Performance and Security

SAN Performance (Cont) - Backups: Online

❖ Performed live on SAN storage array

❖ Incurs heavy I/O penalties due to at least two read requests

❖ Does not require separate storage mechanisms or hardware

❖ Cannot deal with open files (databases)

✦ open file agents can, but not well

NAT Slide 12

Page 13: Storage Area Networks: Performance and Security

SAN Performance (Cont) - Backups: Third Mirror

❖ Volume management intervention

✦ regular RAID-1, with additional mirror set

❖ Data synched, then split for backup

❖ Greatly reduced I/O for backup

✦ not performed on actual production storage array

❖ Still lacking in open file backups

NAT Slide 13

Page 14: Storage Area Networks: Performance and Security

SAN Performance (Cont) - Backups: Frozen Image

❖ Succeeds in backing up open files

❖ Applications must be backup-aware

❖ Apps go in hot backup mode during backup

✦ data files in consistent, quiet state

✦ must cache client data requests during backup

❖ Oracle 2 minute default, then clients time out

NAT Slide 14

Page 15: Storage Area Networks: Performance and Security

SAN Performance (Cont) - QT: One Server & Queue

❖ Queueing theory - study queues, determine performance

❖ Arrival rate λ

❖ Queue items w

❖ Server utilization ρ

❖ Total items r

❖ Avg. time in queue, server, overall Tw, Ts, Tr

Serverλ

ρ

OutputArrivalsQueue

wTw

Ts

rTr

Single Queue Single Server Model

NAT Slide 15

Page 16: Storage Area Networks: Performance and Security

SAN Performance (Cont) - QT: Multiserver Single Queue

❖ Performance increased over single server model

❖ Each server receives percentage of λ

❖ Bank line with multiple tellers example

Server

Server

Server

λ

ArrivalsQueue

Single Queue Multiple Server Model

NAT Slide 16

Page 17: Storage Area Networks: Performance and Security

SAN Performance (Cont) - QT: Modeling Disks and Nets

❖ Extending QT to disk subsystems and networks

❖ SCSI array controller and disks have queues

❖ FC switch, has queues per interface

❖ FC array has controller, FC-AL, and disk models

mλD

mλD

lD

lD

lD

λ

m

D

Disk Array Model

Host Systems

Fibre Channel Switch

Port 1

Port 2

Port N

Array Controller Fibre Channel Arbitrated Loop

Drives

Fibre Channel Disk Array

Storage Network Model

NAT Slide 17

Page 18: Storage Area Networks: Performance and Security

SAN Security - Zoning, LUN Masking & Mapping

❖ Limit the access to SAN storage

✦ goes against complete storage visibility

✦ necessary for security, software access mechanisms

❖ Zoning lets switches determine which ports can talk to other ports

❖ LUN masking lets array controllers determine which LUNs are visible to a port

✦ single RAID device can contain multiple volumes (LUNs)

❖ LUN mapping lets host SAN drivers limit OS disk driver’s access to storage

NAT Slide 18

Page 19: Storage Area Networks: Performance and Security

SAN Security - Cryptography: Private Key

❖ Cryptography - obscure data through math functions

❖ Private key crypto - same en/decryption key

✦ Fast, but hard to distribute and manage key securely

❖ Data Encryption Standard (DES)

✦ government standard since 1977

✦ block cipher, 64 bits, 16 rounds, symmetric

✦ aging, crackable, 56 bit key, slow in software

❖ Advanced Encryption Standard (AES)

✦ opened to public for submission

✦ Rijndael accepted as standard (Twofish, Lucifer)

✦ fast with small memory footprint, 16 byte block size

✦ 10-14 round, 128 - 384 bit key

Key

S−Box

P−Box

i

i−1Left i−1Right

Expansion

Righti

Left

Single DES Round

S S S S S S

Mix Mix Mix Mix

S S S S S S S S S S

Single AES Round

NAT Slide 19

Page 20: Storage Area Networks: Performance and Security

SAN Security (Cont) - Crypto: PubLic Key & Key Exchange

❖ Separation of encryption and decryption keys

✦ public key published for all to use (encryption/signature verification)

✦ private key held by user (decryption/signature hashing)

❖ RSA (Rivest, Shamir, Adleman) most widely known

✦ security lies with factorization of huge integers with only two, non trivial factors

✦ patent expired recently - freely available now

❖ Diffie-Hellman key exchange allows for key swapping over insecure channel

✦ solution for private key sharing

NAT Slide 20

Page 21: Storage Area Networks: Performance and Security

SAN Security (Cont) - Cryptography: Digital Signatures

❖ Alice writes data, Bob wants to verify it’s from her, and was not tampered with

❖ Alice hashes data, encrypts with private key (signature), attaches to data

❖ Bob retrieves Alice’s public key, decrypts hash, computes hash, compares both

❖ If they match, data is valid and belongs to Alice

NAT Slide 21

Page 22: Storage Area Networks: Performance and Security

SAN Security (Cont) - Kerberos

❖ Kerberos developed for use in MIT’s Athena project

❖ Allows users to authenticate to a realm

✦ without revealing passwords

❖ Authentication based on tickets

✦ granted by TGS and AS for application server

❖ Beats MS domain authentication schemes

✦ L0phtcrack?

2

3

10

1

4

56

7

89

11

Application ServerWorkstation

Ticket Granting Server

Authentication Server

Kerberos Database

User

Kerberos Authentication Procedure

NAT Slide 22

Page 23: Storage Area Networks: Performance and Security

Summary

❖ SANs require careful planning with focus on performance and security

❖ Very high speeds over redundant links

❖ Dynamic storage allocation

❖ Separation of storage/control traffic

NAT Slide 23

Page 24: Storage Area Networks: Performance and Security

Discussion

❖ Questions?

NAT Slide 24