rfc1446.txt

来自「中、英文RFC文档大全打包下载完全版 .」· 文本 代码 · 共 1,792 行 · 第 1/5 页

TXT
1,792
字号
          are specific to the Digest Authentication Protocol are          described below.          According to Section 3.2 of [1], a SnmpAuthMsg value is          evaluated during Step 9 of generic processing.  In particular,          it states the SnmpAuthMsg value is evaluated according to the          authentication protocol identified for the SNMPv2 party that          originated the message.  When the relevant authentication          protocol is the Digest Authentication Protocol, the procedure          performed by a SNMPv2 entity whenever a management          communication is received by a SNMPv2 party is as follows.          (1)  If the ASN.1 type of the authInfo component is not               AuthInformation, the message is evaluated as unauthentic,               and the snmpStatsBadAuths counter [14] is incremented.               Otherwise, the authSrcTimestamp, authDstTimestamp, and               authDigest components are extracted from the SnmpAuthMsg               value.          (2)  The local database is consulted to determine the               authentication clock, private authentication key               (extracted, for example, according to the conventions               defined in Section 1.5.1), and lifetime of the SNMPv2               party that originated the message.          (3)  If the authSrcTimestamp component plus the lifetime is               less than the authentication clock, the message is               evaluated as unauthentic, and the snmpStatsNotInLifetimes               counter [14] is incremented.          (4)  The authDigest component is extracted and temporarily               recorded.          (5)  A new SnmpAuthMsg value is constructed such that its               authDigest component is set to the private authentication               key and its other components are set to the value of the               corresponding components in the received SnmpAuthMsg          Galvin & McCloghrie                                  [Page 18]          RFC 1446        Security Protocols for SNMPv2       April 1993               value.  This new SnmpAuthMsg value is serialized               according to the conventions of [13] and [12].  A digest               is computed over the octet sequence representing that               serialized value using, for example, the algorithm               specified in Section 1.5.1.                                            NOTE                    Because serialization rules are unambiguous but may                    not be unique, great care must be taken in                    reconstructing the serialized value prior to                    computing the digest.  Implementations may find it                    useful to keep a copy of the original serialized                    value and then simply modify the octets which                    directly correspond to the placement of the                    authDigest component, rather than re-applying the                    serialization algorithm to the new SnmpAuthMsg                    value.          (6)  If the computed digest value is not equal to the digest               value temporarily recorded in step 4 above, the message               is evaluated as unauthentic, and the               snmpStatsWrongDigestValues counter [14] is incremented.          (7)  The message is evaluated as authentic.          (8)  The local database is consulted for access privileges               permitted by the local access policy to the originating               SNMPv2 party with respect to the receiving SNMPv2 party.               If any level of access is permitted, then:                 the authentication clock value locally recorded for the                 originating SNMPv2 party is advanced to the                 authSrcTimestamp value if this latter exceeds the                 recorded value; and,                 the authentication clock value locally recorded for the                 receiving SNMPv2 party is advanced to the                 authDstTimestamp value if this latter exceeds the                 recorded value.              (Note that this step is conceptually independent from              Steps 15-17 of Section 3.2 in [1]).          If the SnmpAuthMsg value is evaluated as unauthentic, an          authentication failure is noted and the received message is          Galvin & McCloghrie                                  [Page 19]          RFC 1446        Security Protocols for SNMPv2       April 1993          discarded without further processing.  Otherwise, processing          of the received message continues as specified in [1].          Galvin & McCloghrie                                  [Page 20]          RFC 1446        Security Protocols for SNMPv2       April 1993          4.  Symmetric Privacy Protocol          This section describes the Symmetric Privacy Protocol.  It          provides for protection from disclosure of a received message.          An appropriate portion of the message is encrypted according          to a secret key known only to the originator and recipient of          the message.          This protocol assumes the underlying mechanism is a symmetric          encryption algorithm.  In addition, the message to be          encrypted must be protected according to the conventions of          the Digest Authentication Protocol.          Recall from [1] that a SNMPv2 private management communication          is represented by an ASN.1 value with the following syntax:               SnmpPrivMsg ::= [1] IMPLICIT SEQUENCE {                 privDst                    OBJECT IDENTIFIER,                 privData                    [1] IMPLICIT OCTET STRING               }          For each SnmpPrivMsg value that represents a SNMPv2 private          management communication, the following statements are true:          o    Its privDst component is called the privacy destination               and identifies the SNMPv2 party to which the               communication is directed.          o    Its privData component is called the privacy data and               represents the (possibly encrypted) serialization               (according to the conventions of [13] and [12]) of a               SNMPv2 authenticated management communication.          4.1.  Generating a Message          This section describes the behavior of a SNMPv2 entity when it          communicates with a SNMPv2 party for which the privacy          protocol is administratively specified as the Symmetric          Privacy Protocol.  Insofar as the behavior of a SNMPv2 entity          when transmitting a protocol message is defined generically in          [1], only those aspects of that behavior that are specific to          the Symmetric Privacy Protocol are described below.  In          Galvin & McCloghrie                                  [Page 21]          RFC 1446        Security Protocols for SNMPv2       April 1993          particular, this section describes the encapsulation of a          SNMPv2 authenticated management communication into a SNMPv2          private management communication.          According to Section 3.1 of [1], a SnmpPrivMsg value is          constructed during Step 5 of generic processing.  In          particular, it states the privData component is constructed          according to the privacy protocol identified for the SNMPv2          party receiving the message.  When the relevant privacy          protocol is the Symmetric Privacy Protocol, the procedure          performed by a SNMPv2 entity whenever a management          communication is to be transmitted by a SNMPv2 party is as          follows.          (1)  If the SnmpAuthMsg value is not authenticated according               to the conventions of the Digest Authentication Protocol,               the generation of the private management communication               fails according to a local procedure, without further               processing.          (2)  The local database is consulted to determine the private               privacy key of the SNMPv2 party receiving the message               (represented, for example, according to the conventions               defined in Section 1.5.2).          (3)  The SnmpAuthMsg value is serialized according to the               conventions of [13] and [12].          (4)  The octet sequence representing the serialized               SnmpAuthMsg value is encrypted using, for example, the               algorithm specified in Section 1.5.2 and the extracted               private privacy key.          (5)  The privData component is set to the encrypted value.          As set forth in [1], the SnmpPrivMsg value is then serialized          and transmitted to the receiving SNMPv2 party.          4.2.  Receiving a Message          This section describes the behavior of a SNMPv2 entity when it          acts as a SNMPv2 party for which the privacy protocol is          administratively specified as the Symmetric Privacy Protocol.          Insofar as the behavior of a SNMPv2 entity when receiving a          Galvin & McCloghrie                                  [Page 22]          RFC 1446        Security Protocols for SNMPv2       April 1993          protocol message is defined generically in [1], only those          aspects of that behavior that are specific to the Symmetric          Privacy Protocol are described below.          According to Section 3.2 of [1], the privData component of a          received SnmpPrivMsg value is evaluated during Step 4 of          generic processing.  In particular, it states the privData          component is evaluated according to the privacy protocol          identified for the SNMPv2 party receiving the message.  When          the relevant privacy protocol is the Symmetric Privacy          Protocol, the procedure performed by a SNMPv2 entity whenever          a management communication is received by a SNMPv2 party is as          follows.          (1)  The local database is consulted to determine the private               privacy key of the SNMPv2 party receiving the message               (represented, for example, according to the conventions               defined in Section 1.5.2).          (2)  The contents octets of the privData component are               decrypted using, for example, the algorithm specified in               Section 1.5.2 and the extracted private privacy key.          Processing of the received message continues as specified in          [1].          Galvin & McCloghrie                                  [Page 23]          RFC 1446        Security Protocols for SNMPv2       April 1993          5.  Clock and Secret Distribution          The protocols described in Sections 3 and 4 assume the          existence of loosely synchronized clocks and shared secret          values.  Three requirements constrain the strategy by which          clock values and secrets are distributed.          o    If the value of an authentication clock is decreased, the               private authentication key must be changed concurrently.               When the value of an authentication clock is decreased,               messages that have been sent with a timestamp value               between the value of the authentication clock and its new

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?