⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 snmp-user-based-sm-mib.txt

📁 snmp based application it is used to get the info of snmp
💻 TXT
📖 第 1 页 / 共 3 页
字号:
SNMP-USER-BASED-SM-MIB DEFINITIONS ::= BEGINIMPORTS    MODULE-IDENTITY, OBJECT-TYPE,    OBJECT-IDENTITY,    snmpModules, Counter32                FROM SNMPv2-SMI    TEXTUAL-CONVENTION, TestAndIncr,    RowStatus, RowPointer,    StorageType, AutonomousType           FROM SNMPv2-TC    MODULE-COMPLIANCE, OBJECT-GROUP       FROM SNMPv2-CONF    SnmpAdminString, SnmpEngineID,    snmpAuthProtocols, snmpPrivProtocols  FROM SNMP-FRAMEWORK-MIB;snmpUsmMIB MODULE-IDENTITY    LAST-UPDATED "200210160000Z"            -- 16 Oct 2002, midnight    ORGANIZATION "SNMPv3 Working Group"    CONTACT-INFO "WG-email:   snmpv3@lists.tislabs.com                  Subscribe:  majordomo@lists.tislabs.com                              In msg body:  subscribe snmpv3                  Chair:      Russ Mundy                              Network Associates Laboratories                  postal:     15204 Omega Drive, Suite 300                              Rockville, MD 20850-4601                              USA                  email:      mundy@tislabs.com                  phone:      +1 301-947-7107                  Co-Chair:   David Harrington                              Enterasys Networks                  Postal:     35 Industrial Way                              P. O. Box 5004                              Rochester, New Hampshire 03866-5005                              USA                  EMail:      dbh@enterasys.com                  Phone:      +1 603-337-2614                  Co-editor   Uri Blumenthal                              Lucent Technologies                  postal:     67 Whippany Rd.                              Whippany, NJ 07981                              USA                  email:      uri@lucent.com                  phone:      +1-973-386-2163                  Co-editor:  Bert Wijnen                              Lucent Technologies                  postal:     Schagen 33                              3461 GL Linschoten                              Netherlands                  email:      bwijnen@lucent.com                  phone:      +31-348-480-685                 "    DESCRIPTION  "The management information definitions for the                  SNMP User-based Security Model.                  Copyright (C) The Internet Society (2002). This                  version of this MIB module is part of RFC 3414;                  see the RFC itself for full legal notices.                 "--  Revision history    REVISION     "200210160000Z"          -- 16 Oct 2002, midnight    DESCRIPTION  "Changes in this revision:                  - Updated references and contact info.                  - Clarification to usmUserCloneFrom DESCRIPTION                    clause                  - Fixed 'command responder' into 'command generator'                    in last para of DESCRIPTION clause of                    usmUserTable.                  This revision published as RFC3414.                 "    REVISION     "199901200000Z"          -- 20 Jan 1999, midnight    DESCRIPTION  "Clarifications, published as RFC2574"    REVISION     "199711200000Z"          -- 20 Nov 1997, midnight    DESCRIPTION  "Initial version, published as RFC2274"    ::= { snmpModules 15 }-- Administrative assignments ****************************************usmMIBObjects     OBJECT IDENTIFIER ::= { snmpUsmMIB 1 }usmMIBConformance OBJECT IDENTIFIER ::= { snmpUsmMIB 2 }-- Identification of Authentication and Privacy Protocols ************usmNoAuthProtocol OBJECT-IDENTITY    STATUS        current    DESCRIPTION  "No Authentication Protocol."    ::= { snmpAuthProtocols 1 }usmHMACMD5AuthProtocol OBJECT-IDENTITY    STATUS        current    DESCRIPTION  "The HMAC-MD5-96 Digest Authentication Protocol."    REFERENCE    "- H. Krawczyk, M. Bellare, R. Canetti HMAC:                    Keyed-Hashing for Message Authentication,                    RFC2104, Feb 1997.                  - Rivest, R., Message Digest Algorithm MD5, RFC1321.                 "    ::= { snmpAuthProtocols 2 }usmHMACSHAAuthProtocol OBJECT-IDENTITY    STATUS        current    DESCRIPTION  "The HMAC-SHA-96 Digest Authentication Protocol."    REFERENCE    "- H. Krawczyk, M. Bellare, R. Canetti, HMAC:                    Keyed-Hashing for Message Authentication,                    RFC2104, Feb 1997.                  - Secure Hash Algorithm. NIST FIPS 180-1.                 "    ::= { snmpAuthProtocols 3 }usmNoPrivProtocol OBJECT-IDENTITY    STATUS        current    DESCRIPTION  "No Privacy Protocol."    ::= { snmpPrivProtocols 1 }usmDESPrivProtocol OBJECT-IDENTITY    STATUS        current    DESCRIPTION  "The CBC-DES Symmetric Encryption Protocol."    REFERENCE    "- Data Encryption Standard, National Institute of                    Standards and Technology.  Federal Information                    Processing Standard (FIPS) Publication 46-1.                    Supersedes FIPS Publication 46,                    (January, 1977; reaffirmed January, 1988).                  - Data Encryption Algorithm, American National                    Standards Institute.  ANSI X3.92-1981,                    (December, 1980).                  - DES Modes of Operation, National Institute of                    Standards and Technology.  Federal Information                    Processing Standard (FIPS) Publication 81,                    (December, 1980).                  - Data Encryption Algorithm - Modes of Operation,                    American National Standards Institute.                    ANSI X3.106-1983, (May 1983).                 "    ::= { snmpPrivProtocols 2 }-- Textual Conventions ***********************************************KeyChange ::=     TEXTUAL-CONVENTION   STATUS         current   DESCRIPTION         "Every definition of an object with this syntax must identify          a protocol P, a secret key K, and a hash algorithm H          that produces output of L octets.          The object's value is a manager-generated, partially-random          value which, when modified, causes the value of the secret          key K, to be modified via a one-way function.          The value of an instance of this object is the concatenation          of two components: first a 'random' component and then a          'delta' component.          The lengths of the random and delta components          are given by the corresponding value of the protocol P;          if P requires K to be a fixed length, the length of both the          random and delta components is that fixed length; if P          allows the length of K to be variable up to a particular          maximum length, the length of the random component is that          maximum length and the length of the delta component is any          length less than or equal to that maximum length.          For example, usmHMACMD5AuthProtocol requires K to be a fixed          length of 16 octets and L - of 16 octets.          usmHMACSHAAuthProtocol requires K to be a fixed length of          20 octets and L - of 20 octets. Other protocols may define          other sizes, as deemed appropriate.          When a requester wants to change the old key K to a new          key keyNew on a remote entity, the 'random' component is          obtained from either a true random generator, or from a          pseudorandom generator, and the 'delta' component is          computed as follows:           - a temporary variable is initialized to the existing value             of K;           - if the length of the keyNew is greater than L octets,             then:              - the random component is appended to the value of the                temporary variable, and the result is input to the                the hash algorithm H to produce a digest value, and                the temporary variable is set to this digest value;              - the value of the temporary variable is XOR-ed with                the first (next) L-octets (16 octets in case of MD5)                of the keyNew to produce the first (next) L-octets                (16 octets in case of MD5) of the 'delta' component.              - the above two steps are repeated until the unused                portion of the keyNew component is L octets or less,           - the random component is appended to the value of the             temporary variable, and the result is input to the             hash algorithm H to produce a digest value;           - this digest value, truncated if necessary to be the same             length as the unused portion of the keyNew, is XOR-ed             with the unused portion of the keyNew to produce the             (final portion of the) 'delta' component.           For example, using MD5 as the hash algorithm H:              iterations = (lenOfDelta - 1)/16; /* integer division */              temp = keyOld;              for (i = 0; i < iterations; i++) {                  temp = MD5 (temp || random);                  delta[i*16 .. (i*16)+15] =                         temp XOR keyNew[i*16 .. (i*16)+15];              }              temp = MD5 (temp || random);              delta[i*16 .. lenOfDelta-1] =                     temp XOR keyNew[i*16 .. lenOfDelta-1];          The 'random' and 'delta' components are then concatenated as          described above, and the resulting octet string is sent to          the recipient as the new value of an instance of this object.          At the receiver side, when an instance of this object is set          to a new value, then a new value of K is computed as follows:           - a temporary variable is initialized to the existing value             of K;           - if the length of the delta component is greater than L             octets, then:              - the random component is appended to the value of the                temporary variable, and the result is input to the                hash algorithm H to produce a digest value, and the                temporary variable is set to this digest value;              - the value of the temporary variable is XOR-ed with                the first (next) L-octets (16 octets in case of MD5)                of the delta component to produce the first (next)                L-octets (16 octets in case of MD5) of the new value                of K.              - the above two steps are repeated until the unused                portion of the delta component is L octets or less,           - the random component is appended to the value of the             temporary variable, and the result is input to the             hash algorithm H to produce a digest value;           - this digest value, truncated if necessary to be the same             length as the unused portion of the delta component, is             XOR-ed with the unused portion of the delta component to             produce the (final portion of the) new value of K.           For example, using MD5 as the hash algorithm H:              iterations = (lenOfDelta - 1)/16; /* integer division */              temp = keyOld;              for (i = 0; i < iterations; i++) {                  temp = MD5 (temp || random);                  keyNew[i*16 .. (i*16)+15] =                         temp XOR delta[i*16 .. (i*16)+15];              }              temp = MD5 (temp || random);              keyNew[i*16 .. lenOfDelta-1] =                     temp XOR delta[i*16 .. lenOfDelta-1];          The value of an object with this syntax, whenever it is          retrieved by the management protocol, is always the zero          length string.          Note that the keyOld and keyNew are the localized keys.          Note that it is probably wise that when an SNMP entity sends          a SetRequest to change a key, that it keeps a copy of the old          key until it has confirmed that the key change actually          succeeded.         "    SYNTAX       OCTET STRING-- Statistics for the User-based Security Model **********************usmStats         OBJECT IDENTIFIER ::= { usmMIBObjects 1 }usmStatsUnsupportedSecLevels OBJECT-TYPE    SYNTAX       Counter32    MAX-ACCESS   read-only    STATUS       current    DESCRIPTION "The total number of packets received by the SNMP                 engine which were dropped because they requested a                 securityLevel that was unknown to the SNMP engine                 or otherwise unavailable.                "    ::= { usmStats 1 }usmStatsNotInTimeWindows OBJECT-TYPE    SYNTAX       Counter32    MAX-ACCESS   read-only    STATUS       current    DESCRIPTION "The total number of packets received by the SNMP                 engine which were dropped because they appeared                 outside of the authoritative SNMP engine's window.                "    ::= { usmStats 2 }usmStatsUnknownUserNames OBJECT-TYPE    SYNTAX       Counter32    MAX-ACCESS   read-only    STATUS       current    DESCRIPTION "The total number of packets received by the SNMP                 engine which were dropped because they referenced a                 user that was not known to the SNMP engine.                "    ::= { usmStats 3 }

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -