Seagate ST32000646SS Constellation ES.2 SAS Product Manual - Page 44

Random number generator RNG, Drive locking, Data bands, Cryptographic erase

Page 44 highlights

9.2.3 Default password When the drive is shipped from the factory, all passwords are set to the value of MSID. This 32-byte random value is printed on the drive label and it can be read by the host electronically over the I/O. After receipt of the drive, it is the responsibility of the owner to use the default MSID password as the authority to change all other passwords to unique owner-specified values. 9.3 Random number generator (RNG) The drive has a 32-byte hardware RNG that it is uses to derive encryption keys or, if requested to do so, to provide random numbers to the host for system use, including using these numbers as Authentication Keys (passwords) for the drive's Admin and Locking SPs. 9.4 Drive locking In addition to changing the passwords, as described in Section 9.2.3, the owner should also set the data access controls for the individual bands. The variable "LockOnReset" should be set to "PowerCycle" to ensure that the data bands will be locked if power is lost. This scenario occurs if the drive is removed from its cabinet. The drive will not honor any data read or write requests until the bands have been unlocked. This prevents the user data from being accessed without the appropriate credentials when the drive has been removed from its cabinet and installed in another system. When the drive is shipped from the factory, the firmware download port is unlocked. 9.5 Data bands When shipped from the factory, the drive is configured with a single data band called Band 0 (also known as the Global Data Band) which comprises LBA 0 through LBA max. The host may allocate Band1 by specifying a start LBA and an LBA range. The real estate for this band is taken from the Global Band. An additional 14 Data Bands may be defined in a similar way (Band2 through Band15) but before these bands can be allocated LBA space, they must first be individually enabled using the EraseMaster password. Data bands cannot overlap but they can be sequential with one band ending at LBA (x) and the next beginning at LBA (x+1). Each data band has its own drive-generated encryption key and its own user-supplied password. The host may change the Encryption Key (see Section 9.6) or the password when required. The bands should be aligned to 4K LBA boundaries. 9.6 Cryptographic erase A significant feature of SEDs is the ability to perform a cryptographic erase. This involves the host telling the drive to change the data encryption key for a particular band. Once changed, the data is no longer recoverable since it was written with one key and will be read using a different key. Since the drive overwrites the old key with the new one, and keeps no history of key changes, the user data can never be recovered. This is tantamount to an instantaneous data erase and is very useful if the drive is to be scrapped or redispositioned. 36 Constellation ES.2 SAS Product Manual, Rev. C

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76

36
Constellation ES.2 SAS Product Manual, Rev. C
9.2.3
Default password
When the drive is shipped from the factory, all passwords are set to the value of MSID. This 32-byte random
value is printed on the drive label and it can be read by the host electronically over the I/O. After receipt of the
drive, it is the responsibility of the owner to use the default MSID password as the authority to change all other
passwords to unique owner-specified values.
9.3
Random number generator (RNG)
The drive has a 32-byte hardware RNG that it is uses to derive encryption keys or, if requested to do so, to
provide random numbers to the host for system use, including using these numbers as Authentication Keys
(passwords) for the drive’s Admin and Locking SPs.
9.4
Drive locking
In addition to changing the passwords, as described in Section 9.2.3, the owner should also set the data
access controls for the individual bands.
The variable "LockOnReset" should be set to "PowerCycle" to ensure that the data bands will be locked if
power is lost. This scenario occurs if the drive is removed from its cabinet. The drive will not honor any data
read or write requests until the bands have been unlocked. This prevents the user data from being accessed
without the appropriate credentials when the drive has been removed from its cabinet and installed in another
system.
When the drive is shipped from the factory, the firmware download port is unlocked.
9.5
Data bands
When shipped from the factory, the drive is configured with a single data band called Band 0 (also known as
the Global Data Band) which comprises LBA 0 through LBA max. The host may allocate Band1 by specifying a
start LBA and an LBA range. The real estate for this band is taken from the Global Band. An additional 14 Data
Bands may be defined in a similar way (Band2 through Band15) but before these bands can be allocated LBA
space, they must first be individually enabled using the EraseMaster password.
Data bands cannot overlap but they can be sequential with one band ending at LBA (x) and the next beginning
at LBA (x+1).
Each data band has its own drive-generated encryption key and its own user-supplied password. The host may
change the Encryption Key (see Section 9.6) or the password when required. The bands should be aligned to
4K LBA boundaries.
9.6
Cryptographic erase
A significant feature of SEDs is the ability to perform a cryptographic erase. This involves the host telling the
drive to change the data encryption key for a particular band. Once changed, the data is no longer recoverable
since it was written with one key and will be read using a different key. Since the drive overwrites the old key
with the new one, and keeps no history of key changes, the user data can never be recovered. This is
tantamount to an instantaneous data erase and is very useful if the drive is to be scrapped or redispositioned.