rfc1446.txt

来自「中、英文RFC文档大全打包下载完全版 .」· 文本 代码 · 共 1,792 行 · 第 1/5 页

TXT
1,792
字号
               SnmpParty ::= SEQUENCE {                 partyIdentity                    OBJECT IDENTIFIER,                 partyTDomain                    OBJECT IDENTIFIER,                 partyTAddress                    OCTET STRING,                 partyMaxMessageSize                    INTEGER,                 partyAuthProtocol                    OBJECT IDENTIFIER,                 partyAuthClock                    INTEGER,                 partyAuthPrivate                    OCTET STRING,                 partyAuthPublic                    OCTET STRING,                 partyAuthLifetime                    INTEGER,                 partyPrivProtocol                    OBJECT IDENTIFIER,                 partyPrivPrivate                    OCTET STRING,                 partyPrivPublic                    OCTET STRING               }          For each SnmpParty value that represents a SNMPv2 party, the          generic significance of each of its components is defined in          [1].  For each SNMPv2 party that supports the generation of          messages using the Digest Authentication Protocol, additional,          special significance is attributed to certain components of          that party's representation:          o    Its partyAuthProtocol component is called the               authentication protocol and identifies a combination of               the Digest Authentication Protocol with a particular               digest algorithm (such as that defined in Section 1.5.1).               This combined mechanism is used to authenticate the               origin and integrity of all messages generated by the               party.          Galvin & McCloghrie                                  [Page 12]          RFC 1446        Security Protocols for SNMPv2       April 1993          o    Its partyAuthClock component is called the authentication               clock and represents a notion of the current time that is               specific to the party.          o    Its partyAuthPrivate component is called the private               authentication key and represents any secret value needed               to support the Digest Authentication Protocol and               associated digest algorithm.          o    Its partyAuthPublic component is called the public               authentication key and represents any public value that               may be needed to support the authentication protocol.               This component is not significant except as suggested in               Section 5.4.          o    Its partyAuthLifetime component is called the lifetime               and represents an administrative upper bound on               acceptable delivery delay for protocol messages generated               by the party.          For each SNMPv2 party that supports the receipt of messages          via the Symmetric Privacy Protocol, additional, special          significance is attributed to certain components of that          party's representation:          o    Its partyPrivProtocol component is called the privacy               protocol and identifies a combination of the Symmetric               Privacy Protocol with a particular encryption algorithm               (such as that defined in Section 1.5.2).  This combined               mechanism is used to protect from disclosure all protocol               messages received by the party.          o    Its partyPrivPrivate component is called the private               privacy key and represents any secret value needed to               support the Symmetric Privacy Protocol and associated               encryption algorithm.          o    Its partyPrivPublic component is called the public               privacy key and represents any public value that may be               needed to support the privacy protocol.  This component               is not significant except as suggested in Section 5.4.          Galvin & McCloghrie                                  [Page 13]          RFC 1446        Security Protocols for SNMPv2       April 1993          3.  Digest Authentication Protocol          This section describes the Digest Authentication Protocol.  It          provides both for verifying the integrity of a received          message (i.e., the message received is the message sent) and          for verifying the origin of a message (i.e., the reliable          identification of the originator).  The integrity of the          message is protected by computing a digest over an appropriate          portion of a message.  The digest is computed by the          originator of the message, transmitted with the message, and          verified by the recipient of the message.          A secret value known only to the originator and recipient of          the message is prefixed to the message prior to the digest          computation.  Thus, the origin of the message is known          implicitly with the verification of the digest.          A requirement on parties using this Digest Authentication          Protocol is that they shall not originate messages for          transmission to any destination party which does not also use          this Digest Authentication Protocol.  This restriction          excludes undesirable side effects of communication between a          party which uses these security protocols and a party which          does not.          Recall from [1] that a SNMPv2 management communication is          represented by an ASN.1 value with the following syntax:               SnmpMgmtCom ::= [2] IMPLICIT SEQUENCE {                 dstParty                    OBJECT IDENTIFIER,                 srcParty                    OBJECT IDENTIFIER,                 context                    OBJECT IDENTIFIER,                 pdu                    PDUs               }          For each SnmpMgmtCom value that represents a SNMPv2 management          communication, the following statements are true:          o    Its dstParty component is called the destination and               identifies the SNMPv2 party to which the communication is               directed.          Galvin & McCloghrie                                  [Page 14]          RFC 1446        Security Protocols for SNMPv2       April 1993          o    Its srcParty component is called the source and               identifies the SNMPv2 party from which the communication               is originated.          o    Its context component identifies the SNMPv2 context               containing the management information referenced by the               communication.          o    Its pdu component has the form and significance               attributed to it in [12].          Recall from [1] that a SNMPv2 authenticated management          communication is represented by an ASN.1 value with the          following syntax:               SnmpAuthMsg ::= [1] IMPLICIT SEQUENCE {                 authInfo                    ANY, - defined by authentication protocol                 authData                    SnmpMgmtCom               }          For each SnmpAuthMsg value that represents a SNMPv2          authenticated management communication, the following          statements are true:          o    Its authInfo component is called the authentication               information and represents information required in               support of the authentication protocol used by both the               SNMPv2 party originating the message, and the SNMPv2               party receiving the message.  The detailed significance               of the authentication information is specific to the               authentication protocol in use; it has no effect on the               application semantics of the communication other than its               use by the authentication protocol in determining whether               the communication is authentic or not.          o    Its authData component is called the authentication data          Galvin & McCloghrie                                  [Page 15]          RFC 1446        Security Protocols for SNMPv2       April 1993               and represents a SNMPv2 management communication.          In support of the Digest Authentication Protocol, an authInfo          component is of type AuthInformation:               AuthInformation ::= [2] IMPLICIT SEQUENCE {                 authDigest                    OCTET STRING,                 authDstTimestamp                    UInteger32,                 authSrcTimestamp                    UInteger32               }          For each AuthInformation value that represents authentication          information, the following statements are true:          o    Its authDigest component is called the authentication               digest and represents the digest computed over an               appropriate portion of the message, where the message is               temporarily prefixed with a secret value for the purposes               of computing the digest.          o    Its authSrcTimestamp component is called the               authentication timestamp and represents the time of the               generation of the message according to the partyAuthClock               of the SNMPv2 party that originated it.  Note that the               granularity of the authentication timestamp is 1 second.          o    Its authDstTimestamp component is called the               authentication timestamp and represents the time of the               generation of the message according to the partyAuthClock               of the SNMPv2 party that is to receive it.  Note that the               granularity of the authentication timestamp is 1 second.          3.1.  Generating a Message          This section describes the behavior of a SNMPv2 entity when it          acts as a SNMPv2 party for which the authentication protocol          is administratively specified as the Digest Authentication          Protocol.  Insofar as the behavior of a SNMPv2 entity when          transmitting protocol messages is defined generically in [1],          only those aspects of that behavior that are specific to the          Digest Authentication Protocol are described below.  In          Galvin & McCloghrie                                  [Page 16]          RFC 1446        Security Protocols for SNMPv2       April 1993          particular, this section describes the encapsulation of a          SNMPv2 management communication into a SNMPv2 authenticated          management communication.          According to Section 3.1 of [1], a SnmpAuthMsg value is          constructed during Step 3 of generic processing.  In          particular, it states the authInfo component is constructed          according to the authentication protocol identified for the          SNMPv2 party originating the message.  When the relevant          authentication protocol is the Digest Authentication Protocol,          the procedure performed by a SNMPv2 entity whenever a          management communication is to be transmitted by a SNMPv2          party is as follows.          (1)  The local database is consulted to determine the               authentication clock and private authentication key               (extracted, for example, according to the conventions               defined in Section 1.5.1) of the SNMPv2 party originating               the message.  The local database is also consulted to               determine the authentication clock of the receiving               SNMPv2 party.          (2)  The authSrcTimestamp component is set to the retrieved               authentication clock value of the message's source.  The               authDstTimestamp component is set to the retrieved               authentication clock value of the message's intended               recipient.          (3)  The authentication digest is temporarily set to the               private authentication key of the SNMPv2 party               originating the message.  The SnmpAuthMsg value is               serialized according to the conventions of [13] and [12].               A digest is computed over the octet sequence representing               that serialized value using, for example, the algorithm               specified in Section 1.5.1.  The authDigest component is               set to the computed digest value.          As set forth in [1], the SnmpAuthMsg value is then          encapsulated according to the appropriate privacy protocol          into a SnmpPrivMsg value.  This latter value is then          serialized and transmitted to the receiving SNMPv2 party.          Galvin & McCloghrie                                  [Page 17]          RFC 1446        Security Protocols for SNMPv2       April 1993          3.2.  Receiving a Message          This section describes the behavior of a SNMPv2 entity upon          receipt of a protocol message from a SNMPv2 party for which          the authentication protocol is administratively specified as          the Digest Authentication Protocol.  Insofar as the behavior          of a SNMPv2 entity when receiving protocol messages is defined          generically in [1], only those aspects of that behavior that

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?