Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    The Blaster Worm: A Lesson for SAN Managers?

    Written by

    David Morgenstern
    Published August 14, 2003
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      In a recent column, I discussed Fibre Channel security with consultant Himanshu Dwivedi of @stake Inc. The protocol simply wasnt designed with security in mind, he said. Consequently, Fibre Channel suffers inherent weaknesses in frames that render sessions susceptible to hijacking. (For more information, see “How Secure is Your SAN?”)

      However, Dal Allen, president of storage consultancy ENDL Inc. of Saratoga, Calif., took issue with an aspect of Dwivedis analysis and offered a bit of back story to explain the lack of security in the Fibre Channel interface.

      Back in the day, Allen was a member of the Accredited Standards Committee T11, formerly known as X3T11. “Looking at what eventually shipped, I have to agree with Dwivedi. But the architecture once included security,” Allen said. “The protocol was architected on the premise that if you couldnt access the frames you couldnt hack the network.”

      “Early in the Fibre Channel development, experts from NSA, Department of Defense and other security agencies came in and made presentations. This resulted in security recommendations to the committee,” he recalled. “The net result of their efforts was a Security Header that preceded every frame. Unless authorized by a Security Server, a port could not even receive the frame, much less look at it in an intelligible form. There were also bits in the header to identify that the contents of the frame were either encrypted or compressed.”

      “Unfortunately, at the time, Fibre Channel implementers skimped on their chips and excluded frame checking on all but the first frame of a Sequence (this is Fibre Channels term for the equivalent of a message). During an ill-advised frenzy of making the standard fit the implementations, the T11 committee members voted to dump the Security Header and the [hardware-based] encryption and compression features.”

      However, Allen said, the lackluster security was eventually seen as a problem. “A year or so later the specter of security raised its head, and the committee started from scratch. Most of the security thats being standardized in Fibre Channel today is based on LAN principles.

      “My hope for security was that if it was simple and easy, people wouldnt stress about it and they would implement it.” According to Allen, a hardware-based security scheme would have been more transparent to the user, permitting easier security. He said a quick, easy (and dirty) hardware solution could have addressed 90 percent of security issues, letting managers spend more time working on the other 10 percent. At the same time, he admitted that hes a “hardware guy,” who naturally would prefer hardware solutions over software ones.

      “Dwivedis criticisms of Fibre Channel security today are valid and accurate,” Allen said. “But hes wrong in saying that nothing is being done about it because a lot is being done. Still, the big question is: When people get these tools, will they do anything about it anyway? Security is such a bear.”

      Thats a side of human nature exposed by this weeks Blaster worm invasion. Microsoft offered a patch for the vulnerability in July, but many managers and consumers missed or ignored the warning. By the time the worm struck, they were out of luck, facing a super-slow response from Microsofts update site—or worse, a continuous reboot cycle.

      In a similar way, many SAN managers are delaying an examination of their Fibre Channel security. Perhaps they should pay close attention to Blasters other name: LoveSan. Is that an omen or what?

      David Morgenstern is a longtime reporter of the storage industry as well as a veteran of the dotcom boom in the storage-rich fields of professional content creation and digital video.

      More from David Morgenstern:

      David Morgenstern
      David Morgenstern
      David Morgenstern is Executive Editor/Special Projects of eWEEK. Previously, he served as the news editor of Ziff Davis Internet and editor for Ziff Davis' Storage Supersite.In 'the days,' he was an award-winning editor with the heralded MacWEEK newsweekly as well as eMediaweekly, a trade publication for managers of professional digital content creation.David has also worked on the vendor side of the industry, including companies offering professional displays and color-calibration technology, and Internet video.He can be reached here.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×