Techniques and architectures for providing a secure transfer of boot image information are described. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the invention. It will be apparent, however, to one skilled in the art that the invention can be practiced without these specific details. In other instances, structures and devices are shown in block diagram form in order to avoid obscuring the description.
Reference in the specification to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the invention. The appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment.
Some portions of the detailed descriptions which follow are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the networking arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms such as “processing” or “computing” or “calculating” or “determining” or “displaying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various general purpose systems may be used with programs in accordance with the teachings herein, or it may prove convenient to construct more specialized apparatus to perform the required method steps. The required structure for a variety of these systems will appear from the description below. In addition, the invention is not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the invention as described herein.
Network 102 provides an interconnection between multiple network nodes, such as client computers, blade servers, server farms, etc. In one embodiment, network 102 is a local area network (LAN) such as those well known in the art. In alternative embodiments, network 102 can be a wide area network (WAN), the Internet, or any other type of network. Boot image source 101 is a server or other device that stores one or more boot images that can be used to the network nodes supported by the boot image source.
These nodes can be, for example, a server 104 or servers 105 controlled by an IT organization such that technicians can download a boot image from the boot image source 101 via network 102 without having to more directly access the receiving nodes. The boot image is understood to include any data used to bring a system out of a preboot state. This data includes, but is not limited to, operating systems, system utilities, diagnostics, data recovery information and similar system software. The boot image may constitute only part of a boot image exchange, which may further include other information exchanged between devices to facilitate the transmission of the boot image from one device to another. The boot image exchange may include, for example, protocol handshaking, the exchange of secure credentials and encryption key exchanges.
In the first phase 303, the remote boot environment of the PXE client 301 sends PXE DHCP 304 to discover a DHCP server and request an IP address and IP configuration parameters needed to communicate with the boot server. For simplicity of illustration, in this example, the DHCP server is also the boot server 302. The PXE client 301 receives a DHCP ACK 305 which contains an IP information which the PXE client 301 will use to communicate with the boot server 302.
To authenticate itself in the network in which the boot server 302 resides, the PXE client 301 will provide the network access capabilities appropriate to the network access framework. In networks compliant with the Institute of Electrical and Electronics Engineers (IEEE) 802.1X standard, this is in the form of an 802.1X supplicant, executing an appropriate EAP method for authenticating the client to a Network Access Device (NAD), which may be a switch or an Access Point (AP) (not shown in
In the second phase 308, once an authentication channel has been established between the PXE client 301 and network on which the boot server 302 resides, the PXE client 301 can initiate a boot image exchange with the boot server 302. It is understood that a boot image exchange includes all communications which aid the transmission of a boot image from a boot image source to a remote boot environment residing on another computing system. This may include any server discovery and handshaking messages for protocols used in the transmission of the boot image.
The PXE client 301 discovers the boot server 302 through the PXE BOOT SERVER DISCOVER 309 and a returned acknowledgement BOOT SERVER ACK 310. Once the boot server is found, the boot image itself can be requested via PXE DOWNLOAD REQUEST 311. Upon receiving the request for the boot image, the boot server 302 sends BOOT IMAGE 312 to the PXE client 301. In addition to the first phase 303 and second phase 308 of the exchange 300, the PXE 301 may have other credentials or certification 315 (other than a BOAC) to send to the boot server 302 via CREDENTIALS 313 and CREDENTIALS ACK 314. Once the boot image is received, the PXE client 301 can boot itself by executing the boot image 316.
If the PXE does not support data tunneling for a boot image exchange, at 605, the PXE client may perform a traditional, i.e. less secure, PXE exchange, or alternatively not allow the device to remote boot at all (not shown) depending on an enforced administrative policy. If the PXE supports data tunneling for a boot image exchange, at 603, the PXE client tries to negotiate an authentication channel method, e.g. a negotiated EAP method, with the PXE boot server. If the negotiation fails, at 605, the PXE client may perform a traditional, i.e. less secure, PXE exchange, or alternatively not allow the device to remote boot at all (not shown™ depending on an enforced administrative policy. After completion of the traditional PXE exchange, at 606, the PXE client invokes an OS loader of the PXE client which may load the boot image received through an insecure exchange.
If the negotiation succeeds, at 604, the PXE client may perform the method to establish an authentication channel, and conduct a boot image exchange in within the authentication channel. As discussed above, data related to the boot image exchange is tunneled between the PXE client and the PXE boot server. In one embodiment, at least part of the boot image is encrypted, and a TLV/AVP data tunnel is used to exchange encryption key information used to decrypt the boot image. In another embodiment, at least part of the boot image itself is exchanged in a TLV/AVP data tunnel. Once the partially-tunneled PXE transaction between the PXE client and the boot server completes, at 606, the PXE client invokes an OS loader of the PXE client which may load the boot image received through a secure, at least partially tunneled, exchange.
The invention also relates to apparatus for performing the operations described herein. This apparatus may be specially constructed for the required purposes, or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a computer readable storage medium, such as, but is not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus. In alternative embodiments, hard-wired circuitry can be used in place of or in combination with software instructions to implement the invention. Thus, the invention is not limited to any specific combination of hardware circuitry and software instructions.
Computer system 700 can also have a display 706 such as a cathode ray tube (CRT) or liquid crystal display (LCD) coupled to bus 704 via a display controller 705, for displaying information to a computer user. Alphanumeric input/output (I/O) device 710, including alphanumeric and other keys, may also be coupled to bus 704 via an I/O controller 709. Computer system 700 further includes network interface 708 that provides access to a network 712. In one embodiment, network interface 708 is a network interface card (NIC). Network interface 708 is used to download boot images from a remote boot image source server to boot computer system 700 according to one embodiment. The downloaded boot image can be stored, for example, in main memory 104, ROM 106, or other memory device.
One embodiment is related to the use of a data tunnel to securely provide a PXE environment residing on computer system 700 with a boot image. According to one embodiment, an exchange of data with computer system 700 via a data tunnel occurs in response to processor 701 executing sequences of instructions contained in non-volatile storage 702. In alternative embodiments, hard-wired circuitry can be used in place of or in combination with software instructions to implement the invention. Thus, the invention is not limited to any specific combination of hardware circuitry and software instructions.
In this example, an entity such as a boot image source is sending information to another entity such as a PXE client. The information may be sent via an authentication channel such as an EAP channel, as described above. Within the data stream to the PXE client, the boot image source may insert the data structure 800. The data structure 800 begins with a TLV flags field 801 to identify the TLV data structure 800 and, for example, to designate a response in the event the TLV format is not supported by the PXE client. A TLV type number field 802 is used to indicate how information is formatted in the data structure 800. The data structure 800 also includes a TLV length field 803, to indicate a length of data being sent via the data structure 800. The data structure 800 also includes a TLV data filed 804, alternately known as the TLV value field, which represents the actual tunneled data being sent from the boot image source to the PXE client.
While the invention has been described in terms of several embodiments, those skilled in the art will recognize that the invention is not limited to the embodiments described, but can be practiced with modification and alteration within the spirit and scope of the appended claims. The description is thus to be regarded as illustrative instead of limiting.