Chapter 7

advertisement
Chapter 7
Chapter 7
SNMPv3
Network Management: Principles and Practice
© Mani Subramanian 2000
7-1
Chapter 7
Key Features
• Modularization of document
• Modularization of architecture
• SNMP engine
• Security feature
• Secure information
• Access control
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
7-2
Chapter 7
Documentation
SNMP
D o c u m e n ta tio n
S N M P F ra m e w o rk s
SNMPv1
SN M Pv2 RF C 19xx
SN M Pv3 RF C 2271
e ra l*
admap
p lic a b ility S ta te m e n t
e x is te n c e a n d T ra n s itio n
e
io n s
M IB s
S ta n d a rd v 1 R F C 1 1 5 7 F o rm a t
S ta n d a rd v 1 R F C 1 2 1 2 F o rm a t
H is to ric R F C 1 4 x x F o rm a t
D ra ft R F C 1 9 x x F o rm a t
M e s s a g e H a n d lin g
T ra n s p o rt M a p p in g s
M e s s a g e P ro c e s s in g
a n d D is p a tc h e r R F C 2 2 7 3
S e c u rity R F C 2 2 7 4
P D U H a n d lin g
P ro to c o l O p e
A p p lic a tio n s
Access C ont
c u m e n ts
F C s 1442, 1443, and 1444
F C s 1902, 1903, and 1904
F ig u re 7 .1 S N M P D o c u m e n ta tio n (re c o m m e n d e d in S N M P v 3 )
• Compare this to the document organization in Chapter 4
Network Management: Principles and Practice
© Mani Subramanian 2000
7-3
Chapter 7
Architecture
S N M P e n tity
S N M P E n g in e (id e n tifie d b y s n m p E n g in e ID )
D is p a tc h e r
M essage
P ro c e s s in g
S u b s y s te m
S e c u rity
S u b s y s te m
Access
C o n tro l
S u b s y s te m
A p p lic a tio n (s )
C om m and
G e n e ra to r
N o tific a tio n
R e c e iv e r
P ro x y
F o rw a rd e r
S u b s y s te m
C om m and
R esponder
N o tific a tio n
O rig in a to r
O th e r
F ig u re 7 .2 S N M P v 3 A rc h ite c tu re
Notes
• SNMP entity is a node with an SNMP management
element - either an agent or manager or both
• Three names associated with an entity
• Entities: SNMP engine
• Identities: Principal and security name
• Management Information: Context engine
Network Management: Principles and Practice
© Mani Subramanian 2000
7-4
Chapter 7
SNMP Engine ID
1st
b it
SN M Pv1
SN M Pv2
0
E n te rp ris e ID
(1 -4 o c te ts )
E n te rp ris e m e th o d
(5 th o c te t)
F u n c tio n o f th e m e th o d
(6 -1 2 o c te ts )
SN M Pv3
1
E n te rp ris e ID
(1 -4 o c te ts )
F o rm a t in d ic a to r
(5 th o c te t)
F o rm a t
(v a ria b le n u m b e r o f o c te ts )
F ig u re 7 .3 S N M P E n g in e ID
Notes
• Each SNMP engine has a unique ID: snmpEngineID
• Acme Networks {enterprises 696}
• SNMPv1 snmpEngineID ‘000002b8’H
• SNMPv3 snmpEngineID ‘800002b8’H
(the 1st octet is 1000 0000)
Network Management: Principles and Practice
© Mani Subramanian 2000
7-5
Chapter 7
SNMPv3 Engine ID Format
5th Octet
T a b le 7 .2 S N M P v3 E n g in e ID F o rm a t (5 th o c tet)
0
R e se rve d , un u se d
1
IP v4 a d d re ss (4 o cte ts)
2
IP v6 (1 6 o ctets)
L o w e st n o n -sp e cial IP a dd re ss
3
M A C a d d re ss (6 o ctets)
L o w e st IE E E M A C a d d re ss, ca n o nical ord e r
4
T e xt, a d m in istrative ly a ssig n e d
M a xim u m re m a inin g le ng th 2 7
5
O cte ts, a d m in istra tively a ssig n e d
M a xim u m re m a inin g le ng th 2 7
6 -1 2 7
R e se rve d , un u se d
1 2 8 -2 55
A s d e fine d b y the e n terp rise s
M a xim u m re m a inin g le ng th 2 7
Notes
• For SNMPv1 and SNMPv2:
• Octet 5 is the method
• Octet 6-12 is IP address
• Examples: IBM host IP address 10.10.10.10
SNMPv1: 00 00 00 02 01 0A 0A 0A 0A 00 00 00
SNMPv3: 10 00 00 02 02 00 00 00 00 00 00 00 0A 0A 0A 0A
Network Management: Principles and Practice
© Mani Subramanian 2000
7-6
Chapter 7
Dispatcher
S N M P E n g in e (id e n tifie d b y s n m p E n g in e ID )
D is p a tc h e r
M essage
P ro c e s s in g
S u b s y s te m
S e c u rity
S u b s y s te m
Access
C o n tro l
S u b s y s te m
• One dispatcher in an SNMP engine
• Handles multiple version messages
• Interfaces with application modules, network, and
message processing models
• Three components for three functions
• Transport mapper delivers messages over the
transport protocol
• Message Dispatcher routes messages between
network and appropriate module of MPS
• PDU dispatcher handles messages between
application and MSP
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
7-7
Chapter 7
Message Processing Subsystem
S N M P E n g in e (id e n tifie d b y s n m p E n g in e ID )
D is p a tc h e r
M essage
P ro c e s s in g
S u b s y s te m
S e c u rity
S u b s y s te m
Access
C o n tro l
S u b s y s te m
• Contains one or more Message Processing Models
• One MPM for each SNMP version
• SNMP version identified in the header
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
7-8
Chapter 7
Security and Access Control
S N M P E n g in e (id e n tifie d b y s n m p E n g in e ID )
D is p a tc h e r
M essage
P ro c e s s in g
S u b s y s te m
S e c u rity
S u b s y s te m
Access
C o n tro l
S u b s y s te m
• Security at the message level
• Authentication
• Privacy of message via secure communication
• Flexible access control
• Who can access
• What can be accessed
• Flexible MIB views
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
7-9
Chapter 7
Applications
A p p lic a tio n (s )
C om m and
G e n e ra to r
N o tific a tio n
R e c e iv e r
P ro x y
F o rw a rd e r
S u b s y s te m
C om m and
R esponder
N o tific a tio n
O rig in a to r
O th e r
Application
• Command generator
• Command responder
• Notification receiver
• Notification receiver
• Proxy Forwarder
(SNMP versions only)
• Other
Example
get-request
get-response
trap generation
trap processing
get-bulk to get-next
Special application
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
7-10
Chapter 7
Names
• SNMP Engine ID
snmpEngineID
• Principal
principal
Who: person or group or application
• Security Name
securityName
human readable name
• Context Engine ID
contextEngineID
• Context Name
contextName
Notes
• An SNMP agent can monitor more than one
network element (context)
Examples:
SNMP Engine ID
IP address
Principal
John Smith
Security Name Administrator
Principal
Li, David, Kristen, Rashmi,
Security Name Operator
Network Management: Principles and Practice
© Mani Subramanian 2000
7-11
Chapter 7
Abstract Service Interface
p rim itiv e A B
IN = a 1 , a 2 .
OUT = b1, b2
S u b s y s te m A
S u b s y s te m B
p rim itiv e B C
S u b s y s te m C
s ta tu s In fo rm a tio n /
re s u lt
A b s tra c t
S e rv ic e
In te rfa c e
A b s tra c t
S e rv ic e
In te rfa c e
F ig u re 7 .4 (a ) A b s tra c t S e rv ic e In te rfa c e
Notes
• Abstract service interface is a conceptual interface
between modules, independent of implementation
• Defines a set of primitives
• Primitives associated with receiving entities except
for Dispatcher
• Dispatcher primitives associated with
• messages to and from applications
• registering and un-registering of application
modules
• transmitting to and receiving messages from
network
• IN and OUT parameters
• Status information / result
Network Management: Principles and Practice
© Mani Subramanian 2000
7-12
Chapter 7
sendPdu
C om m and
G e n e ra to r
s e n d P d u H a n d le /
e rro rIn d ic a tio n
A b s tra c t
S e rv ic e
In te rfa c e
D is p a tc h e r
p r e p a re O u t g o in g M e s s a g e
sendPDU Primitive
M essage
P ro c e s s in g
Model
A b s tra c t
S e rv ic e
In te rfa c e
F ig u re 7 .4 (b ) A b s tra c t S e rv ic e In te rfa c e fo r s e n d P d u
Notes
• sendPdu request sent by the application module,
command generator, is associated with the
receiving module, dispatcher
• After the message is transmitted over the network,
dispatcher sends a handle to the command generator
for tracking the response
• sendPdu is the IN parameter
• sendPduHandle is the OUT parameter, shown as
coupled to the IN parameter
Network Management: Principles and Practice
© Mani Subramanian 2000
7-13
Chapter 7
Dispatcher Primitives
M o d u le
P rim itive
S e rvic e P ro vid e d
D isp a tche r
se n d P d u
R e q u e st fro m a p p lica tio n to se n d a
P D U to a re m o te e n tity
D isp a tche r
p ro ce ssP d u
P ro ce ssin g o f in co m in g m e ssa g e
fro m re m o te e n tity
D isp a tche r
re tu rn R esp o n se P d u
R e q u e st fro m a p p lica tio n to se n d a
re sp o n se P D U
D isp a tche r
p ro ce ssR e sp on se P d u
P ro ce ssin g o f in co m in g re sp o n se
fro m a re m o te e n tity
D isp a tche r
re giste rC on te xtE n g in e ID
R e g ister re q u e st fro m a C o n te xt
E n g in e
D isp a tche r
u n re gisterC o n te xtE n g in e ID
U n re giste r re q ue st fro m a C o n te xt
E n g in e
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
7-14
Chapter 7
Command Generator
M essage
P ro c e s s in g
Model
C om m and
G e n e ra to r
S e c u rity
Model
D is p a tc h e r
sendPdu
p re p a re O u tg o in g M e s s a g e
g e n e ra te R e q u e s tM s g
P d u H a n d le
s e n d g e t-re q u e s t m e s s a g e
N e tw o rk
re c e iv e g e t-re s p o n s e m e s s a g e
p re p a re D a ta E le m e ts
p ro c e s s In c o m in g M s g
p ro c e s s R e s p o n s e P d u
C om m and
G e n e ra to r
D is p a tc h e r
M essage
P ro c e s s in g
Model
Network Management: Principles and Practice
© Mani Subramanian 2000
S e c u rity
Model
7-15
Chapter 7
Command Responder
C om m and
R esponder
M essage
P ro c e s s in g
Model
D is p a tc h e r
S e c u rity
Model
p ro c e s s P d u
p ro c e s s In c o m in g M s g
p re p a re D a ta E le m e n ts
re g is te rC o n te x tE n g in e ID
re c e iv e g e t-re q u e s t m e s s a g e
N e tw o rk
s e n d g e t-re s p o n s e m e s s a g e
g e n e ra te R e s p o n s e M s g
p re p a re R e s p o n s e M s g
re tu rn R e s p o n s e P d u
D is p a tc h e r
M essage
P ro c e s s in g
Model
S e c u rity
Model
F ig u r e 7 .6 C o m m a n d R e s p o n d e r A p p lic a tio n
Network Management: Principles and Practice
© Mani Subramanian 2000
7-16
Chapter 7
Notification / Proxy
• Notification originator
• Generates trap and inform messages
• Determine target, SNMP version, and security
• Decides context information
• Notification receiver
• Registers with SNMP engine
• Receives notification messages
• Proxy forwarder
• Proxy server
• Handles only SNMP messages by
• Command generator
• Command responder
• Notification generator
• Report indicator
• Uses the translation table in the proxy group MIB
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
7-17
Chapter 7
SNMpV2 MIB
In te rn e t
{1 3 6 1 }
d ire c to ry
(1 )
mgmt
(2
e x p e rim e n ta l
(3 )
p riv a te
(4 )
s n m p d o m a in s
(1 )
s e c u rity
(5 )
s n m p P ro x y s
(2 )
m ib -2
(1 )
s y s te m
(1 )
snm pv2
(6 )
s n m p M o d u le s
(3 )
s n m p M IB
(1 )
snm p
(1 1 )
s n m p M IB O b je c ts
(1 )
s n m p M IB C o n fo rm a n c e
(2 )
F ig u r e 6 .3 1 S N M P v 2 In te r n e t G r o u p
Notes
• SNMPv3 MIB developed under snmpModules
• Security placeholder not used
Network Management: Principles and Practice
© Mani Subramanian 2000
7-18
Chapter 7
SNMPv3 MIB
s n m p M o d u le s
{1 .3 .6 .1 .6 .3 }
s n m p F ra m e w o rk M IB (1 0 )
s n m p V a c m M IB (1 6 )
s n m p M P D M IB (1 1 )
s n m p U s m M IB (1 5 )
s n m p T a rg e tM IB (1 2 )
s n m p P ro x y M IB (1 4 )
s n m p N o tific a tio n M IB (1 3 )
F ig u r e 7 .7 S N M P v 3 M IB
Notes
• snmpFrameworkMIB describes SNMP
management architecture
• snmpMPDMIB identifies objects in the message
processing and dispatch subsystems
• snmpTargetMIB and snmpNotificationMIB used
for notification generation
• snmpProxyMIB defines translation table for proxy
forwarding
• snmpUsMIB defines user-based security model
objects
• snmpVacmMIB defines objects for view-based
access control
Network Management: Principles and Practice
© Mani Subramanian 2000
7-19
Chapter 7
SNMPv3 Target MIB
s n m p T a rg e tM IB
{s n m p M o d u le s 1 2 }
s n m p T a rg e tO b je c ts
(1 )
s n m p T a rg e tA d d rT a b le
(2 )
s n m p T a rg e tP a ra m s T a b le
(3 )
F ig u re 7 .8 T a rg e t A d d re s s a n d T a rg e t P a ra m e te r T a b le s
Notes
• Target MIB contains two tables
• Target address table contains addresses of the
targets for notifications (see notification group)
• Target address table also contains information for
establishing the transport parameters
• Target address table contains reference to the
second table, target parameter table
• Target parameter table contains security parameters
for authentication and privacy
Network Management: Principles and Practice
© Mani Subramanian 2000
7-20
Chapter 7
SNMPv3 Notification MIB
s n m p N o tific a tio n M IB
{s n m p M o d u le s 1 3 }
s n m p N o tify O b je c ts
(1 )
s n m p N o tify T a b le (1 )
s n m p N o tify F ilte rT a b le (1 )
s n m p N o tify F ilte rP ro file T a b le
(2 )
F ig u r e 7 .9 S N M P N o tific a tio n T a b le s
Notes
• Notification group contains three tables
• Notify table contains groups of management targets
to receive notifications and the type of notifications
• The target addresses to receive notifications that
are listed in target address table (see target group)
are tagged here
• Notification profile table defines filter profiles
associated with target parameters
• Notification filter table contains table profiles of the
targets
Network Management: Principles and Practice
© Mani Subramanian 2000
7-21
Chapter 7
Security Threats
M o d ific a tio n o f in fo rm a tio n
M a s q u e ra d e
M e s s a g e s tre a m m o d ific a tio n
M anagem ent
E n tity A
M anagem ent
E n tity B
D is c lo s u re
F ig u r e 7 .1 0 S e c u r ity T h r e a ts to M a n a g e m e n t In fo r m a tio n
Notes
• Modification of information: Contents modified by
unauthorized user, does not include address change
• Masquerade: change of originating address by
unauthorized user
• Fragments of message altered by an unauthorized
user to modify the meaning of the message
• Disclosure is eavesdropping
• Disclosure does not require interception of message
• Denial of service and traffic analysis are not considered as threats
Network Management: Principles and Practice
© Mani Subramanian 2000
7-22
Chapter 7
Security Services
S e c u rity S u b s y s te m
D a ta In te g rity
A u th e n tic a tio n
M o d u le
D a ta O rig in A u th e n tic a tio n
M essage
P ro c e s s in g
Model
D a ta C o n fid e n tia lity
P riv a c y
M o d u le
M e s s a g e T im e lin e s s &
L im ite d R e p la y P ro te c tio n
T im e lin e s s
M o d u le
F ig u re 7 .1 1 S e c u rity S e rv ic e s
Notes
• Authentication
• Data integrity:
• HMAC-MD5-96 / HMAC-SHA-96
• Data origin authentication
• Append to the message a unique Identifier
associated with authoritative SNMP engine
• Privacy / confidentiality:
• Encryption
• Timeliness:
• Authoritative Engine ID, No. of engine boots
and time in seconds
Network Management: Principles and Practice
© Mani Subramanian 2000
7-23
Chapter 7
Role of SNMP Engines
Non-Authoritative Engine
(NMS)
Authoritative Engine
(Agent)
Notes
• Responsibility of Authoritative engine:
• Unique SNMP engine ID
• Time-stamp
• Non-authoritative engine should keep a table of the
time-stamp and authoritative engine ID
Network Management: Principles and Practice
© Mani Subramanian 2000
7-24
Chapter 7
SNMPv3 Message Format
scopedPD U
age
S iz e
M essage
F la g
V e rs io n
rita tiv e
n e ID
M essage
S e c u rity
Model
G lo b a l/
H eader
D a ta
C o n te x t
E n g in e ID
S e c u rity
P a ra m e te rs
Co
N
P la in te x t / E n c ry p te d
s c o p e d P D U D a ta
S e c u rity P a ra m e te rs
A u th o rita tiv e
E n g in e B o o ts
A u th o rita tiv e
E n g in e T im e
U ser
Name
A u th e n tic a tio n
P a ra m e te rs
P riv a c
P a ra m e t
F ig u r e 7 .1 2 S N M P v 3 M e s s a g e F o r m a t
Network Management: Principles and Practice
© Mani Subramanian 2000
7-25
Chapter 7
SNMPv3 Message Format
F ie ld
O b je c t n a m e
D e s c rip tio n
V e rs io n
m s g V e rs io n
S N M P v e rs io n n u m b e r o f th e
m e s s a g e fo r m a t
M e s s a g e ID
m s g ID
A d m in is tra tiv e ID a s so cia te d w ith th e
message
M e s s a g e M a x. S iz e
m s g M a xS iz e
M a xim u m s iz e s u p p orte d b y th e
sender
M e s s a g e flag s
m s g F la g s
B it field s id en tifyin g re p o rt,
a u th e n tic a tion , a nd p riv a c y o f th e
message
M e s s a g e S e c u rity
M odel
m s g S e c u rity M o d el
S e c u rity m o d e l u s e d for th e m e s s a g e ;
c o n c u rren t m u ltip le m o d e ls allo w e d
S e c u rity P a ra m e te rs m s g S e c u rity P a ra m e te rs
(S e e T a ble 7 .8 )
S e c u rity p a ra m e te rs u s e d fo r
c o m m u n ic a tio n b e tw e e n s e nd in g a nd
re c eivin g s e c urity m o d u le s
P lain te xt/E n c ry p te d
s c o p e d P D U D a ta
s c o p e d P d u D a ta
C h o ic e o f plain te xt o r e n c ry pte d
s c o p e d P D U ; s c o p e d P D U u niqu ely
id e ntifie s c o n te xt a n d P D U
C o n te xt E n g in e ID
c o n te xtE n g in e ID
U n iq ue ID o f a c o n te xt (m a n a g e d
e n tity ) w ith a co n te xt n a m e re a liz e d b y
a n S N M P e n tity
C o n te xt N a m e
c o n te xtN a m e
N a m e o f th e c o n te xt (m a n a g e d e n tity)
PDU
d a ta
C o n ta in s u n en c ry p ted P D U
Network Management: Principles and Practice
© Mani Subramanian 2000
7-26
Chapter 7
User-Based Security Model
• Based on traditional user name concept
• USM primitives across abstract service interfaces
• Authentication service primitives
• authenticateOutgoingMsg
• authenticateIncomingMsg
• Privacy Services
• encryptData
• decryptData
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
7-27
Chapter 7
Secure Outgoing Message
S e c u rity S u b s y s te m
M P M In fo rm a tio n
U s e r-b a s e d
S e c u rity
Model
H e a d e r d a ta
S e c u rity d a ta
scopedPD U
E n c ry p tio n k e y
scopedPD U
P
M
P riv a c y
p a ra m e te rs
E n c ry p te d
scopedPD U
A u th e n tic a tio n k e y
A u th e n tic a te d /e n c ry p te d )
w h o le m e s s a g e
W h o le m e s s a g e le n g th
W h o le M e s s a g e
A u th e n tic a te d
W h o le M e s s a g e
A u th
M
S e c u rity P a ra m e te rs
F ig u re 7 .1 3 P riv a c y a n d A u th e n tic a tio n S e rv ic e fo r O u tg o in g M e s s a g e
Notes
• USM invokes privacy module w/ encryption key and scopedPD
• Privacy module returns privacy parameters and encrypted scop
• USM then invokes the authentication module w/authentication
whole message and receives authenticated whole message
Network Management: Principles and Practice
© Mani Subramanian 2000
7-28
Chapter 7
Secure Incoming Message
S e c u rity S u b s y s te m
M P M In fo rm a tio n
H e a d e r d a ta
S e c u rity p a ra m e te rs
w h o le m e s s a g e
A u th e n tic a tio n k e y
U s e r-b a s e d
S e c u rity
Model
W h o le M e s s a g e
(a s re c e iv e d fro m n e tw o rk )
A u th e n tic a tio n
p a ra m e te rs
A u th e n tic a te d
W h o le M e s s a g e
D e c ry p t k e y
E n c ry p te d P D U
D e c ry p te d ) s c o p e d P D U
P riv a c y
p a ra m e te rs
D e c ry p te d
scopedPD U
F ig u re 7 .1 4 P riv a c y a n d A u th e n tic a tio n S e rv ic e fo r In c o m in g M e s s a g e
Notes
• Processing secure incoming message reverse of secure
• Authentication validation done first by the authentication m
• Decryption of the message done then by the privacy mod
Network Management: Principles and Practice
© Mani Subramanian 2000
7-29
Chapter 7
Security Parameters
s n m p M o d u le s
{1 .3 .6 .1 .6 .3 }
s n m p F ra m e w o rk M IB
(1 0 )
s n m p F ra m e w o rk M IB O b je c ts
(1 )
s n m p E n g in e
(1 )
s n m p U s m M IB
(1 5 )
s n m p F ra m e w o rk A d m in
(1 )
s n m p A u th P ro to c o ls
(1 )
U s m M IB O b je c ts
(1 )
s n m p P riv P ro to c o ls
(2 )
U s m U s e rS p in L o c k
(1 )
U sm U ser
(2 )
U s m U s e rT a b le
(2 )
F ig u r e 7 .1 5 S N M P v 3 M IB O b je c ts fo r S e c u r ity P a r a m e te r s
Notes
T a b le 7 .8 S e c u rity P a ra m e te rs a n d C o rr e s p o n d in g M IB O b je c ts
S e c u rity P a ra m e te rs
m s g A u th o rita tiv e E n g in e ID
m s g A u th o rita tiv e E n g in e B o
o ts
m s g A u th o rita tiv e E n g in e T i
me
m s g U s e rN a m e
m s g A u th e n tic a tio n P a ra m e
te rs
m s g P riv a c yP a ra m e te rs
U S M U s e r G ro u p O b je c ts
s n m p E n g in e ID (u n d e r s n m p E n g in e G ro u p )
s n m p E n g in e B o o ts (u n d e r s n m p E n g in e G ro u p )
s n m p E n g in e T im e (u n d e r s n m p E n g in e G ro u p )
u s m U s e rN a m e (in u s m U s e rT a b le )
u s m U s e rA u th P ro to c o l (in u s m U s e rT a b le )
u s m U s e rP riv P ro to c o l (in u s m U s e rT a b le )
Network Management: Principles and Practice
© Mani Subramanian 2000
7-30
Chapter 7
Privacy Module
• Encryption and decryption of scoped PDU
(context engine ID, context name, and PDU)
• CBC - DES (Cipher Block Chaining - Data
Encryption Standard) symmetric protocol
• Encryption key (and initialization vector)
made up of secret key (user password), and
timeliness value
• Privacy parameter is salt value (unique for
each packet) in CBC-DES
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
7-31
Chapter 7
Authentication Key
• Secret key for authentication
• Derived from user (NMS) password
• MD5 or SHA-1 algorithm used
• Authentication key is digest2
Notes
Procedure:
1. Derive digest0:
Password repeated until it forms 220 octets.
2. Derive digest1:
Hash digest0 using MD5 or SHA-1.
3. Derive digest2:
Concatenate authoritative SNMP engine ID and
digest1 and hash with the same algorithm
Network Management: Principles and Practice
© Mani Subramanian 2000
7-32
Chapter 7
Authentication Parameters
• Authentication parameter is Hashed Message
Access Code (HMAC)
• HMAC is 96-bit long (12 octets)
• Derived from authorization key (authKey)
Notes
Procedure:
1. Derive extendedAuthKey:
Supplement authKey with 0s to get 64-byte string
2. Define ipad, opad, K1, and K2:
ipad = 0x36 (00110110) repeated 64 times
opad = 0x5c (01011100) repeated 64 times
K1 = extendedAuthKey XOR ipad
K2 = extendedAuthKey XOR opad
3. Derive HMAC by hashing algorithm used
HMAC = H (K2, H (K1, wholeMsg))
Network Management: Principles and Practice
© Mani Subramanian 2000
7-33
Chapter 7
Encryption Protocol
• Cipher Block Chaining mode of
Data Encryption Standard (CBC-DES) protocol
• 16-octet privKey is secret key
• First 8-octet of privKey used as 56-bit DES key;
(Only 7 high-order bits of each octet used)
• Last 8-octet of privKey used as pre-initialization vector
T ra n s m is s io n
C hannel
C ip he rte xt
D e c ry p tio n
P la in text
S e c re t K e y
E n c ry p tio n
S e c re t K e y
P la in text
F ig u r e 1 3 .3 3 B a s ic C ry p to g r a p h ic C o m m u n ic a tio n
Notes
• CBC Mode
• Plaintext divided into 64-bit blocks
• Each block is XOR-d with ciphertext of the
previous block and then encrypted
• Use pre-IV (initialization vector) for prefixing
the first message block
Network Management: Principles and Practice
© Mani Subramanian 2000
7-34
Chapter 7
Access Control
• View-based Access Control Model
• Groups: Name of the group comprising
security model and security name:
In SNMPv1, is community name
• Security Level
• no authentication - no privacy
• authentication - no privacy
• authentication - privacy
• Contexts: Names of the context
• MIB Views and View Families
• MIB view is a combination of view subtrees
• Access Policy
• read-view
• write-view
• notify-view
• not-accessible
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
7-35
Chapter 7
VCAM Process
Answers 6 questions:
1. Who are you (group)?
2. Where do you want to go (context)?
3. How secured are you to access the information
(security model and security level)?
4. Why do you want to access the information
(read, write, or send notification)?
5. What object (object type) do you want to
access?
6. Which object (object instance) do you want to
access?
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
7-36
u rity
del
Chapter 7
VCAM Process
S e cu rity
N am e
(P rin cip a l)
W h o a re y o u ?
G ro u p
S e cu rity
M odel
C o n te xt
N am e
C o n te xt
T a b le
H o w s e c u re d
a re y o u ?
S e c u rity L e v e l
G o W h e re?
C o n te x t
n o S u ch C o n te xt
S e cu rity
L e ve l
C o n te xt
N am e
M odel
L e ve l
G ro u p N a m e
me
R ead
A cce ss
T a b le
n o A cce ssE n try
n o S u ch V ie w
W rite
W hy do yo
w ant acces
V ie w T y p
Access
A llo w e d ?
V ie w N a m e
re a d /w rite /n o tify
V ie w T re e
F a m ily
T a b le
V ie w T yp e
S e le c t V a ria b le
Names
n o S u ch V ie w
n o tIn V ie w
Yes / N o
A cce ss
A llo w e d
F ig u re 7 .1 6 V A C M P ro c e s s
Network Management: Principles and Practice
© Mani Subramanian 2000
7-37
Ob
T
W
Chapter 7
VACM MIB
s n m p V a c m M IB
(s n m p M o d u le s 1 6 )
v a c m M IB O b je c ts
(1 )
v a c m C o n te x tT a b le
(1 )
v a c m S e c u rity T o G ro u p T a b le
(2 )
v a c m A c c e s s T a b le
(4 )
v a c m V ie w S p in L o c k
(1 )
v a c m M IB V ie w s
(5 )
v a c m V ie w T re e F a m ily A c c e s s T a b le
(2 )
F ig u re 7 .1 7 V A C M M IB
Notes
• Four tables used to achieve access control
• Group defined by security-to-group table
• Context defined by context table
• Access determines access allowed and the
view name
• View tree family table determines the MIB view,
which is very flexible
Network Management: Principles and Practice
© Mani Subramanian 2000
7-38
Chapter 7
MIB Views
Simple view:
system
1.3.6.1.2.1.1
Complex view:
All information relevant to a particular interface system and interfaces groups
Family view subtrees
View with all columnar objects in a row appear
as separate subtree.
OBJECT IDENTIFIER (family name)
paired with
bit-string value (family mask)
to select or suppress columnar objects
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
7-39
Chapter 7
VACM MIB View
v a c m M IB V ie w s
(v a c m M IB O b je c ts 5 )
v a c m V ie w S p in L o c k
(1 )
v a c m V ie w T re e F a m ily T a b le
(2 )
v a c m V ie w T re e F a m ily E n try
(1 )
v a c m V ie w T r e e F a m ily V ie w N a m e (1 )
v a c m V ie w T r e e F a m ily S u b tr e e (2 )
v a c m V ie w T re e F a m ily M a s k (3 )
v a c m V ie w T re e F a m ily S ta tu s (6 )
v a c m V ie w T re e F a m ily S to ra g e T y p e (5 )
v a c m V ie w T re e F a m ily T y p e (4 )
F ig u r e 7 .1 9 V A C M M IB V ie w s
Notes
Example:
Family view name = “system”
Family subtree = 1.3.6.1.2.1.1
Family mask = “” (implies all 1s by convention)
Family type = 1 (implies value to be included)
Network Management: Principles and Practice
© Mani Subramanian 2000
7-40
Download