HP EVA P6550 HP P6300/P6500 EVA User Guide (5697-2486, September 2013) - Page 131

Setting up authentication, CHAP restrictions, Microsoft Initiator CHAP secret restrictions

Page 131 highlights

Setting up authentication Challenge Handshake Authentication Protocol (CHAP) is an authentication protocol used for secure logon between the iSCSI Initiator and iSCSI target. CHAP uses a challenge-response security mechanism for verifying the identity of an initiator without revealing a secret password that is shared by the two entities. It is also referred to as a three-way handshake. An important concept of CHAP is that the initiator must prove to the target that it knows a shared secret without actually revealing the secret. (Sending the secret across the wire could reveal it to an eavesdropper.) CHAP provides a mechanism for doing this. NOTE: Setting up authentication for your iSCSI devices is optional. If you require authentication, HP recommends that you configure it after you have properly verified installation and operation of the iSCSI implementation without authentication. In a secure environment, authentication may not be required, access to the targets is limited only to trusted initiators. In a less secure environment, the target cannot determine if a connection request is truly from a given host. In that case, the target can use CHAP to authenticate an initiator. When an initiator contacts a target that uses CHAP, the target (called the authenticator) responds by sending the initiator a challenge. The challenge is a piece of information that is unique for this authentication session. The initiator then encrypts this information, using a previously-issued password that is shared by both initiator and target. The encrypted information is then returned to the target. The target has the same password and uses it as a key to encrypt the information it originally sent to the initiator. It compares its results with the encrypted results sent by the initiator. If they are the same, the initiator is assumed to be authentic These schemes are often called proof of possession protocols. The challenge requires that an entity prove possession of a shared key or one of the key pairs in a public key scheme. This procedure is repeated throughout the session to verify that the correct initiator is still connected. Repeating these steps prevents someone from stealing the initiator's session by replaying information that was intercepted on the line. There are sever alInternet RFCs that cover CHAP in more detail: • RFC 1994 (PPP Challenge Handshake Authentication Protocol, August 1996 • RFC 2433 (Microsoft PPP CHAP Extensions, October 1998) • RFC 2759 (Microsoft PPP CHAP Extensions version 2, January 2000) CHAP restrictions The CHAP restrictions are as follows: • Maximum length of 100 characters • Minimum length of 1 character • No restriction on the type of characters that can be entered • Entering an IQN using the HP P6000 Command View add host tab requires the iSCSI initiator to have been registered by the iSCSI or iSCSI/FCoE module's initiator database. Implying that the initiator's target discovery has completed. Microsoft Initiator CHAP secret restrictions • Maximum length of 16 characters • Minimum length of 12 characters • No restriction on the type of characters that can be entered • When an initiator uses iSNS for target discovery, only normal session CHAP applies Set up the iSCSI Initiator 131

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316

Setting up authentication
Challenge Handshake Authentication Protocol (CHAP) is an authentication protocol used for secure
logon between the iSCSI Initiator and iSCSI target. CHAP uses a challenge-response security
mechanism for verifying the identity of an initiator without revealing a secret password that is
shared by the two entities. It is also referred to as a three-way handshake. An important concept
of CHAP is that the initiator must prove to the target that it knows a shared secret without actually
revealing the secret. (Sending the secret across the wire could reveal it to an eavesdropper.) CHAP
provides a mechanism for doing this.
NOTE:
Setting up authentication for your iSCSI devices is optional. If you require authentication,
HP recommends that you configure it after you have properly verified installation and operation
of the iSCSI implementation without authentication.
In a secure environment, authentication may not be required, access to the targets is limited only
to trusted initiators.
In a less secure environment, the target cannot determine if a connection request is truly from a
given host. In that case, the target can use CHAP to authenticate an initiator.
When an initiator contacts a target that uses CHAP, the target (called the authenticator) responds
by sending the initiator a challenge. The challenge is a piece of information that is unique for this
authentication session. The initiator then encrypts this information, using a previously-issued password
that is shared by both initiator and target. The encrypted information is then returned to the target.
The target has the same password and uses it as a key to encrypt the information it originally sent
to the initiator. It compares its results with the encrypted results sent by the initiator. If they are the
same, the initiator is assumed to be authentic
These schemes are often called proof of possession protocols. The challenge requires that an entity
prove possession of a shared key or one of the key pairs in a public key scheme.
This procedure is repeated throughout the session to verify that the correct initiator is still connected.
Repeating these steps prevents someone from stealing the initiator’s session by replaying information
that was intercepted on the line.
There are sever alInternet RFCs that cover CHAP in more detail:
RFC 1994 (PPP Challenge Handshake Authentication Protocol, August 1996
RFC 2433 (Microsoft PPP CHAP Extensions, October 1998)
RFC 2759 (Microsoft PPP CHAP Extensions version 2, January 2000)
CHAP restrictions
The CHAP restrictions are as follows:
Maximum length of 100 characters
Minimum length of 1 character
No restriction on the type of characters that can be entered
Entering an IQN using the HP P6000 Command View add host tab requires the iSCSI initiator
to have been registered by the iSCSI or iSCSI/FCoE module's initiator database. Implying
that the initiator's target discovery has completed.
Microsoft Initiator CHAP secret restrictions
Maximum length of 16 characters
Minimum length of 12 characters
No restriction on the type of characters that can be entered
When an initiator uses iSNS for target discovery, only normal session CHAP applies
Set up the iSCSI Initiator
131