⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2274.txt

📁 著名的RFC文档,其中有一些文档是已经翻译成中文的的.
💻 TXT
📖 第 1 页 / 共 5 页
字号:
Network Working Group                                      U. BlumenthalRequest for Comments: 2274                     IBM T. J. Watson ResearchObsoletes: 2264                                                B. WijnenCategory: Standards Track                      IBM T. J. Watson Research                                                            January 1998          User-based Security Model (USM) for version 3 of the              Simple Network Management Protocol (SNMPv3)Status of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (1998).  All Rights Reserved.IANA Note   Due to a clerical error in the assignment of the snmpModules in this   memo, this RFC provides the corrected number assignment for this   protocol.  This memo obsoletes RFC 2264.Abstract   This document describes the User-based Security Model (USM) for SNMP   version 3 for use in the SNMP architecture [RFC2271].  It defines the   Elements of Procedure for providing SNMP message level security.   This document also includes a MIB for remotely monitoring/managing   the configuration parameters for this Security Model.Table of Contents1.  Introduction                                                       31.1.  Threats                                                          41.2.  Goals and Constraints                                            51.3.  Security Services                                                61.4.  Module Organization                                              71.4.1.  Timeliness Module                                              71.4.2.  Authentication Protocol                                        81.4.3.  Privacy Protocol                                               81.5.  Protection against Message Replay, Delay and Redirection         81.5.1.  Authoritative SNMP engine                                      8Blumenthal & Wijnen         Standards Track                     [Page 1]RFC 2274                     USM for SNMPv3                 January 19981.5.2.  Mechanisms                                                     91.6.  Abstract Service Interfaces.                                    101.6.1.  User-based Security Model Primitives for Authentication       111.6.2.  User-based Security Model Primitives for Privacy              112.  Elements of the Model                                             122.1.  User-based Security Model Users                                 122.2.  Replay Protection                                               132.2.1.  msgAuthoritativeEngineID                                      132.2.2.  msgAuthoritativeEngineBoots and msgAuthoritativeEngineTime    142.2.3.  Time Window                                                   152.3.  Time Synchronization                                            152.4.  SNMP Messages Using this Security Model                         162.5.  Services provided by the User-based Security Model              172.5.1.  Services for Generating an Outgoing SNMP Message              172.5.2.  Services for Processing an Incoming SNMP Message              192.6.  Key Localization Algorithm.                                     213.  Elements of Procedure                                             213.1.  Generating an Outgoing SNMP Message                             223.2.  Processing an Incoming SNMP Message                             254.  Discovery                                                         305.  Definitions                                                       316.  HMAC-MD5-96 Authentication Protocol                               456.1.  Mechanisms                                                      456.1.1.  Digest Authentication Mechanism                               466.2.  Elements of the Digest Authentication Protocol                  466.2.1.  Users                                                         466.2.2.  msgAuthoritativeEngineID                                      476.2.3.  SNMP Messages Using this Authentication Protocol              476.2.4.  Services provided by the HMAC-MD5-96 Authentication Module    476.2.4.1.  Services for Generating an Outgoing SNMP Message            476.2.4.2.  Services for Processing an Incoming SNMP Message            486.3.  Elements of Procedure                                           496.3.1.  Processing an Outgoing Message                                496.3.2.  Processing an Incoming Message                                507.  HMAC-SHA-96 Authentication Protocol                               517.1.  Mechanisms                                                      517.1.1.  Digest Authentication Mechanism                               517.2.  Elements of the HMAC-SHA-96 Authentication Protocol             527.2.1.  Users                                                         527.2.2.  msgAuthoritativeEngineID                                      527.2.3.  SNMP Messages Using this Authentication Protocol              537.2.4.  Services provided by the HMAC-SHA-96 Authentication Module    537.2.4.1.  Services for Generating an Outgoing SNMP Message            537.2.4.2.  Services for Processing an Incoming SNMP Message            547.3.  Elements of Procedure                                           547.3.1.  Processing an Outgoing Message                                557.3.2.  Processing an Incoming Message                                558.  CBC-DES Symmetric Encryption Protocol                             56Blumenthal & Wijnen         Standards Track                     [Page 2]RFC 2274                     USM for SNMPv3                 January 19988.1.  Mechanisms                                                      568.1.1.  Symmetric Encryption Protocol                                 578.1.1.1.  DES key and Initialization Vector.                          578.1.1.2.  Data Encryption.                                            588.1.1.3.  Data Decryption                                             598.2.  Elements of the DES Privacy Protocol                            598.2.1.  Users                                                         598.2.2.  msgAuthoritativeEngineID                                      598.2.3.  SNMP Messages Using this Privacy Protocol                     608.2.4.  Services provided by the DES Privacy Module                   608.2.4.1.  Services for Encrypting Outgoing Data                       608.2.4.2.  Services for Decrypting Incoming Data                       618.3.  Elements of Procedure.                                          618.3.1.  Processing an Outgoing Message                                618.3.2.  Processing an Incoming Message                                629.  Intellectual Property                                             6210. Acknowledgements                                                  6311. Security Considerations                                           6411.1. Recommended Practices                                           6411.2. Defining Users                                                  6611.3. Conformance                                                     6712. References                                                        6713. Editors' Addresses                                                69A.1.  SNMP engine Installation Parameters                             70A.2.  Password to Key Algorithm                                       71A.2.1.  Password to Key Sample Code for MD5                           71A.2.2.  Password to Key Sample Code for SHA                           72A.3.  Password to Key Sample Results                                  73A.3.1.  Password to Key Sample Results using MD5                      73A.3.2.  Password to Key Sample Results using SHA                      74A.4.  Sample encoding of msgSecurityParameters                        74B.  Full Copyright Statement                                          761.  Introduction   The Architecture for describing Internet Management Frameworks   [RFC2271] describes that an SNMP engine is composed of:     1) a Dispatcher     2) a Message Processing Subsystem,     3) a Security Subsystem, and     4) an Access Control Subsystem.   Applications make use of the services of these subsystems.   It is important to understand the SNMP architecture and the   terminology of the architecture to understand where the Security   Model described in this document fits into the architecture andBlumenthal & Wijnen         Standards Track                     [Page 3]RFC 2274                     USM for SNMPv3                 January 1998   interacts with other subsystems within the architecture.  The reader   is expected to have read and understood the description of the SNMP   architecture, as defined in [RFC2271].   This memo [RFC2274] describes the User-based Security Model as it is   used within the SNMP Architecture.  The main idea is that we use the   traditional concept of a user (identified by a userName) with which   to associate security information.   This memo describes the use of HMAC-MD5-96 and HMAC-SHA-96 as the   authentication protocols and the use of CBC-DES as the privacy   protocol. The User-based Security Model however allows for other such   protocols to be used instead of or concurrent with these protocols.   Therefore, the description of HMAC-MD5-96, HMAC-SHA-96 and CBC-DES   are in separate sections to reflect their self-contained nature and   to indicate that they can be replaced or supplemented in the future.   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED",  "MAY", and "OPTIONAL" in this   document are to be interpreted as described in [RFC2119].1.1.  Threats   Several of the classical threats to network protocols are applicable   to the network management problem and therefore would be applicable   to any SNMP Security Model.  Other threats are not applicable to the   network management problem.  This section discusses principal   threats, secondary threats, and threats which are of lesser   importance.   The principal threats against which this SNMP Security Model should   provide protection are:   - Modification of Information     The modification threat is the danger that some unauthorized entity     may alter in-transit SNMP messages generated on behalf of an     authorized user in such a way as to effect unauthorized management     operations, including falsifying the value of an object.   - Masquerade     The masquerade threat is the danger that management operations not     authorized for some user may be attempted by assuming the identity     of another user that has the appropriate authorizations.   Two secondary threats are also identified.  The Security Model   defined in this memo provides limited protection against:Blumenthal & Wijnen         Standards Track                     [Page 4]RFC 2274                     USM for SNMPv3                 January 1998   - Disclosure     The disclosure threat is the danger of eavesdropping on the     exchanges between managed agents and a management station.     Protecting against this threat may be required as a matter of local     policy.   - Message Stream Modification     The SNMP protocol is typically based upon a connection-less     transport service which may operate over any sub-network service.     The re-ordering, delay or replay of messages can and does occur     through the natural operation of many such sub-network services.     The message stream modification threat is the danger that messages     may be maliciously re-ordered, delayed or replayed to an extent     which is greater than can occur through the natural operation of a     sub-network service, in order to effect unauthorized management     operations.   There are at least two threats that an SNMP Security Model need not   protect against.  The security protocols defined in this memo do not   provide protection against:   - Denial of Service     This SNMP Security Model does not attempt to address the broad     range of attacks by which service on behalf of authorized users is     denied.  Indeed, such denial-of-service attacks are in many cases     indistinguishable from the type of network failures with which any     viable network management protocol must cope as a matter of course.   - Traffic Analysis     This SNMP Security Model does not attempt to address traffic     analysis attacks.  Indeed, many traffic patterns are predictable -     devices may be managed on a regular basis by a relatively small     number of management applications - and therefore there is no     significant advantage afforded by protecting against traffic     analysis.1.2.  Goals and Constraints   Based on the foregoing account of threats in the SNMP network   management environment, the goals of this SNMP Security Model are as   follows.   1) Provide for verification that each received SNMP message has      not been modified during its transmission through the network.   2) Provide for verification of the identity of the user on whose      behalf a received SNMP message claims to have been generated.Blumenthal & Wijnen         Standards Track                     [Page 5]RFC 2274                     USM for SNMPv3                 January 1998   3) Provide for detection of received SNMP messages, which request      or contain management information, whose time of generation was      not recent.   4) Provide, when necessary, that the contents of each received      SNMP message are protected from disclosure.   In addition to the principal goal of supporting secure network   management, the design of this SNMP Security Model is also influenced   by the following constraints:   1) When the requirements of effective management in times of

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -