📄 rfc1352.txt
字号:
as the behavior of a SNMP protocol entity when transmitting a protocol message is defined generically in [2], only those aspects of that behavior that are specific to the Symmetric Privacy Protocol are described below. In particular, this section describes the encapsulation of a SNMP authenticated management communication into a SNMP private management communication. According to [2], a SnmpPrivMsg value is constructed during Step 5 of generic processing. In particular, it states the privData component is constructed according to the privacy protocol identified for the SNMP party receiving the message. When the relevant privacy protocol is the Symmetric Privacy Protocol, the procedure performed by a SNMP protocol entity whenever a management communication is to be transmitted by a SNMP party is as follows. 1. If the SnmpAuthMsg value is not authenticated according to the conventions of the Digest Authentication Protocol, the generation of the private management communication fails according to a local procedure, without further processing. 2. The local database is consulted to determine the private privacy key of the SNMP party receiving the messageGalvin, McCloghrie, & Davin [Page 17]RFC 1352 SNMP Security Protocols July 1992 (represented, for example, according to the conventions defined in Section 2.4.2). 3. The SnmpAuthMsg value is serialized according to the conventions of [12] and [1]. 4. The octet sequence representing the serialized SnmpAuthMsg value is encrypted using, for example, the algorithm specified in Section 2.4.2 and the extracted private privacy key. 5. The privData component is set to the encrypted value. As set forth in [2], the SnmpPrivMsg value is then serialized and transmitted to the receiving SNMP party.5.2 Receiving a Message This section describes the behavior of a SNMP protocol entity when it acts as a SNMP party for which the privacy protocol is administratively specified as the Symmetric Privacy Protocol. Insofar as the behavior of a SNMP protocol entity when receiving a protocol message is defined generically in [2], only those aspects of that behavior that are specific to the Symmetric Privacy Protocol are described below. According to [2], the privData component of a received SnmpPrivMsg value is evaluated during Step 4 of generic processing. In particular, it states the privData component is evaluated according to the privacy protocol identified for the SNMP party receiving the message. When the relevant privacy protocol is the Symmetric Privacy Protocol, the procedure performed by a SNMP protocol entity whenever a management communication is received by a SNMP party is as follows. 1. The local database is consulted to determine the private privacy key of the SNMP party receiving the message (represented, for example, according to the conventions defined in Section 2.4.2). 2. The contents octets of the privData component are decrypted using, for example, the algorithm specified in Section 2.4.2 and the extracted private privacy key. Processing of the received message continues as specified in [2].Galvin, McCloghrie, & Davin [Page 18]RFC 1352 SNMP Security Protocols July 19926. Clock and Secret Distribution The protocols described in Sections 4 and 5 assume the existence of loosely synchronized clocks and shared secret values. Three requirements constrain the strategy by which clock values and secrets are distributed. o If the value of an authentication clock is decreased, the last-timestamp and private authentication key must be changed concurrently. When the value of an authentication clock is decreased, messages that have been sent with a timestamp value between the value of the authentication clock and its new value may be replayed. Changing the private authentication key obviates this threat. However, changing the authentication clock and the private authentication key is not sufficient to ensure proper operation. If the last-timestamp is not reduced similarly to the authentication clock, no message will be considered authentic until the value of the authentication clock exceeds the value of the last-timestamp. o The private authentication key and private privacy key must be known only to the parties requiring knowledge of them. Protecting the secrets from disclosure is critical to the security of the protocols. In particular, if the secrets are distributed via a network, the secrets must be protected with a protocol that supports confidentiality, e.g., the Symmetric Privacy Protocol. Further, knowledge of the secrets must be as restricted as possible within an implementation. In particular, although the secrets may be known to one or more persons during the initial configuration of a device, the secrets should be changed immediately after configuration such that their actual value is known only to the software. A management station has the additional responsibility of recovering the state of all parties whenever it boots, and it may address this responsibility by recording the secrets on a long-term storage device. Access to information on this device must be as restricted as is practically possible. o There must exist at least one SNMP protocol entity that assumes the role of a responsible management station. This management station is responsible for ensuring thatGalvin, McCloghrie, & Davin [Page 19]RFC 1352 SNMP Security Protocols July 1992 all authentication clocks are synchronized and for changing the secret values when necessary. Although more than one management station may share this responsibility, their coordination is essential to the secure management of the network. The mechanism by which multiple management stations ensure that no more than one of them attempts to synchronize the clocks or update the secrets at any one time is a local implementation issue. A responsible management station may either support clock synchronization and secret distribution as separate functions, or combine them into a single functional unit. The first section below specifies the procedures by which a SNMP protocol entity is initially configured. The next two sections describe one strategy for distributing clock values and one for determining a synchronized clock value among SNMP parties supporting the Digest Authentication Protocol. For SNMP parties supporting the Symmetric Privacy Protocol, the next section describes a strategy for distributing secret values. The last section specifies the procedures by which a SNMP protocol entity recovers from a "crash."6.1 Initial Configuration This section describes the initial configuration of a SNMP protocol entity that supports the Digest Authentication Protocol or both the Digest Authentication Protocol and the Symmetric Privacy Protocol. When a network device is first installed, its initial, secure configuration must be done manually, i.e., a person must physically visit the device and enter the initial secret values for at least its first secure SNMP party. This requirement suggests that the person will have knowledge of the initial secret values. In general, the security of a system is enhanced as the number of entities that know a secret is reduced. Requiring a person to physically visit a device every time a SNMP party is configured not only exposes the secrets unnecessarily but is administratively prohibitive. In particular, when MD5 is used, the initial authentication secret is 128 bits long and when DES is used an additional 128 bits are needed -- 64 bits each for the key and initialization vector. Clearly, these values will need to be recorded on a medium in order to be transported between a responsible management station and a managed agent. The recommended procedure is to configure a small set of initial SNMP parties for each SNMP protocol entity, one pair of which may be used initially to configure all other SNMP parties.Galvin, McCloghrie, & Davin [Page 20]RFC 1352 SNMP Security Protocols July 1992 In fact, there is a minimal, useful set of SNMP parties that could be configured between each responsible management station and managed agent. This minimal set includes one of each of the following for both the responsible management station and the managed agent: o a SNMP party for which the authentication protocol and privacy protocol are the values noAuth and noPriv, respectively, o a SNMP party for which the authentication protocol identifies the mechanism defined in Section 2.4.1 and its privacy protocol is the value noPriv, and o a SNMP party for which the authentication protocol and privacy protocol identify the mechanisms defined in Section 2.4.1 and Section 2.4.2, respectively. The last of these SNMP parties in both the responsible management station and the managed agent could be used to configure all other SNMP parties. It is the only suitable party for this purpose because it is the only party that supports data confidentiality, which is necessary in order to protect the distributed secrets from disclosure to unauthorized entities. Configuring one pair of SNMP parties to be used to configure all other parties has the advantage of exposing only one pair of secrets -- the secrets used to configure the minimal, useful set identified above. To limit this exposure, the responsible management station should change these values as its first operation upon completion of the initial configuration. In this way, secrets are known only to the peers requiring knowledge of them in order to communicate. The Management Information Base (MIB) document [4] supporting these security protocols specifies 6 initial party identities and initial values, which, by convention, are assigned to the parties and their associated parameters. All 6 parties should be configured in each new managed agent and its responsible management station. The responsible management station should be configured first, since the management station can be used to generate the initial secrets and provide them to a person, on a suitable medium, for distribution to the managed agent. The following sequence of steps describes the initial configuration of a managed agent and its responsible management station. 1. Determine the initial values for each of the attributes of the SNMP party to be configured. Some of these values may be computed by the responsible managementGalvin, McCloghrie, & Davin [Page 21]RFC 1352 SNMP Security Protocols July 1992 station, some may be specified in the MIB document, and some may be administratively determined. 2. Configure the parties in the responsible management station, according to the set of initial values. If the management station is computing some initial values to be entered into the agent, an appropriate medium must be present to record the values. 3. Configure the parties in the managed agent, according to the set of initial values. 4. The responsible management station must synchronize the authentication clock values for each party it shares with each managed agent. Section 6.3 specifies one strategy by which this could be accomplished. 5. The responsible management station should change the secret values manually configured to ensure the actual values are known only to the peers requiring knowledge of them in order to communicate. To do this, the management station generates new secrets for each party to be reconfigured and distributes those secrets with a strategy that uses a protocol that protects them from disclosure, e.g., Symmetric Privacy Protocol (see Section 6.4). Upon receiving positive acknowledgement that the new values have been distributed, the management station should update its local database with the new values. If the managed agent does not support a protocol that protects messages from disclosure, then automatic maintenance and configuration of parties is not possible, i.e., the last step above is not possible. The secrets can only be changed by a physical visit to the device. If there are other SNMP protocol entities requiring knowledge of the secrets, the responsible management station must distribute the information upon completion of the initial configuration. The mechanism used must protect the secrets from disclosure to unauthorized entities. The Symmetric Privacy Protocol, for example, is an acceptable mechanism.6.2 Clock Distribution A responsible management station must ensure that the authentication clock value for each SNMP party for which it is responsibleGalvin, McCloghrie, & Davin [Page 22]RFC 1352 SNMP Security Protocols July 1992
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -