Seagate ST800FM0022 Pulsar.2 SAS Product Manual - Page 42

Ata Bands, Ryptographic Erase, Uthenticated Firmware Download, Ower Requirements, Upported Commands

Page 42 highlights

8.5 DATA BANDS When shipped from the factory, the drive is configured with a single data band called Band 0 (also known as the Global Data Band) which comprises LBA 0 through LBA max. The host may allocate Band1 by specifying a start LBA and an LBA range. The real estate for this band is taken from the Global Band. An additional 14 Data Bands may be defined in a similar way (Band2 through Band15) but before these bands can be allocated LBA space, they must first be individually enabled using the EraseMaster password. Data bands cannot overlap but they can be sequential with one band ending at LBA (x) and the next beginning at LBA (x+1). Each data band has its own drive-generated encryption key and its own user-supplied password. The host may change the Encryption Key (see Section 8.6) or the password when required. The bands shall be aligned to 4KB LBA boundaries. 8.6 CRYPTOGRAPHIC ERASE A significant feature of SEDs is the ability to perform a cryptographic erase. This involves the host telling the drive to change the data encryption key for a particular band. Once changed, the data is no longer recoverable since it was written with one key and will be read using a different key. Since the drive overwrites the old key with the new one, and keeps no history of key changes, the user data can never be recovered. This is tantamount to an instantaneous data erase and is very useful if the drive is to be scrapped or redispositioned. 8.7 AUTHENTICATED FIRMWARE DOWNLOAD In addition to providing a locking mechanism to prevent unwanted firmware download attempts, the drive also only accepts download files which have been cryptographically signed by the appropriate Seagate Design Center. Three conditions must be met before the drive will allow the download operation: 1. The download must be an SED file. A standard (base) drive (non-SED) file will be rejected. 2. The download file must be signed and authenticated. 3. As with a non-SED drive, the download file must pass the acceptance criteria for the drive. For example it must be applicable to the correct drive model, and have compatible revision and customer status. 8.8 POWER REQUIREMENTS The standard drive models and the SED drive models have identical hardware, however the security and encryption portion of the drive controller ASIC is enabled and functional in the SED models. This represents a small additional drain on the 5V supply of about 30mA and a commensurate increase of about 150mW in power consumption. There is no additional drain on the 12V supply. See the tables in Section 6.3 for power requirements on the standard (non-SED) drive models. 8.9 SUPPORTED COMMANDS The SED models support the following two commands in addition to the commands supported by the standard (non-SED) models as listed in Table 16: • SECURITY PROTOCOL OUT (B5h) • SECURITY PROTOCOL IN (A2h) 8.10 SANITIZE - CRYPTOGRAPHIC ERASE This command cryptographically erases all user data on the drive by destroying the current data encryption key and replacing it with a new data encryption key randomly generated by the drive. Sanitize CRYPTOGRAPHIC ERASE is a SCSI CDB Op code 48h and selecting the service action code 3 (CRYPTOGRAPHIC ERASE). 8.11 REVERTSP SED models will support the RevertSP feature which erases all data in all bands on the device and returns the contents of all SPs (Security Providers) on the device to their original factory state. In order to execute the RevertSP method the unique PSID (Physical Secure ID) printed on the drive label must be provided. PSID is not electronically accessible and can only be manually read from the drive label or scanned in via the 2D barcode. 8.12 SANITIZE FEATURE SET ON SED DRIVES The drive shall support the Sanitize Feature Set as defined in ANSI/INCITS ACS-2 with the exceptions and/or modifications described in this section. The drive shall not support the OVERWRITE EXT and BLOCK ERASE EXT sub-commands. Support of the SANITIZE FREEZE LOCK EXT command shall be determined on a customer-specific basis. OEM drives shall support the command. PULSAR.2 SAS PRODUCT MANUAL, REV. C 36

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69

P
ULSAR
.2 SAS P
RODUCT
M
ANUAL
, R
EV
. C
36
8.5
D
ATA BANDS
When shipped from the factory, the drive is configured with a single data band called Band 0 (also known as the Global Data Band) which
comprises LBA 0 through LBA max. The host may allocate Band1 by specifying a start LBA and an LBA range. The real estate for this
band is taken from the Global Band. An additional 14 Data Bands may be defined in a similar way (Band2 through Band15) but before
these bands can be allocated LBA space, they must first be individually enabled using the EraseMaster password.
Data bands cannot overlap but they can be sequential with one band ending at LBA (x) and the next beginning at LBA (x+1).
Each data band has its own drive-generated encryption key and its own user-supplied password. The host may change the Encryption Key
(see Section 8.6) or the password when required. The bands shall be aligned to 4KB LBA boundaries.
8.6
C
RYPTOGRAPHIC ERASE
A significant feature of SEDs is the ability to perform a cryptographic erase. This involves the host telling the drive to change the data
encryption key for a particular band. Once changed, the data is no longer recoverable since it was written with one key and will be read
using a different key. Since the drive overwrites the old key with the new one, and keeps no history of key changes, the user data can
never be recovered. This is tantamount to an instantaneous data erase and is very useful if the drive is to be scrapped or redispositioned.
8.7
A
UTHENTICATED FIRMWARE DOWNLOAD
In addition to providing a locking mechanism to prevent unwanted firmware download attempts, the drive also only accepts download files
which have been cryptographically signed by the appropriate Seagate Design Center.
Three conditions must be met before the drive will allow the download operation:
1.
The download must be an SED file. A standard (base) drive (non-SED) file will be rejected.
2.
The download file must be signed and authenticated.
3.
As with a non-SED drive, the download file must pass the acceptance criteria for the drive. For example it must be applicable to the
correct drive model, and have compatible revision and customer status.
8.8
P
OWER REQUIREMENTS
The standard drive models and the SED drive models have identical hardware, however the security and encryption portion of the drive
controller ASIC is enabled and functional in the SED models. This represents a small additional drain on the 5V supply of about 30mA and
a commensurate increase of about 150mW in power consumption. There is no additional drain on the 12V supply. See the tables in
Section 6.3 for power requirements on the standard (non-SED) drive models.
8.9
S
UPPORTED COMMANDS
The SED models support the following two commands in addition to the commands supported by the standard (non-SED) models as listed
in Table 16:
SECURITY PROTOCOL OUT (B5h)
SECURITY PROTOCOL IN (A2h)
8.10
S
ANITIZE
- C
RYPTOGRAPHIC
E
RASE
This command cryptographically erases all user data on the drive by destroying the current data encryption key and replacing it with a new
data encryption key randomly generated by the drive.
Sanitize CRYPTOGRAPHIC ERASE is a SCSI CDB Op code 48h and selecting the
service action code 3 (CRYPTOGRAPHIC ERASE).
8.11
R
EVERT
SP
SED models will support the RevertSP feature which erases all data in all bands on the device and returns the contents of all SPs (Security
Providers) on the device to their original factory state. In order to execute the RevertSP method the unique PSID (Physical Secure ID)
printed on the drive label must be provided.
PSID is not electronically accessible and can only be manually read from the drive label or
scanned in via the 2D barcode.
8.12
S
ANITIZE
F
EATURE
S
ET ON
SED D
RIVES
The drive shall support the Sanitize Feature Set as defined in ANSI/INCITS ACS-2 with the exceptions and/or modifications described in
this section.
The drive shall not support the OVERWRITE EXT and BLOCK ERASE EXT sub-commands.
Support of the SANITIZE FREEZE LOCK EXT command shall be determined on a customer-specific basis. OEM drives shall support the
command.