[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [dhcwg] RE: draft-bakke-dhc-snmp-trap-00.txt



"Wijnen, Bert (Bert)" wrote:
> 
> So it seems you did not think about it in detail.
> What I hate to see is a partial solution to jsut the trap
> handling. That is what the IPCDN (cable modem folk) seemed
> to be doing too... and I pushed back on that (partial)
> solution too. I do not have a answer ready...
> 
> First question would be: is it a generic problem that people face?

Yes.  There are increasingly more solutions that allow hosts,
racks of servers, embedded devices, etc. to be booted from
the network.  When this fails, the host's normal configuration
info (particularly the SNMP notification list) is not available,
so there's no good way to tell a management station about it.

I assume that most networks would want to use SNMP for this,
but syslog would work as well.

> 
> Second question: what is the complete scope of the problem?

My personal complete scope is to set a notification list for
SNMPv1 and v2c hosts, with v3 a possibility in the future.
Since this is used only for notifications, I assume that
supporting v3 authentication would be a good idea (so
notifications are not spoofed) but that privacy is probably
not that much of an issue (but again, may need to be there
for completeness).  

> Third question: what would be a good/feasable/workable solution?

However, it may not be possible to configure enough of the
security stuff securely (did I say that right) using DHCP
to actually make use of v3 security.

If that's the case, there could be a compromise:

- Configure the list of v1, v2c, and v3 notification targets
  as I had proposed, with only the security name (and not the
  keys) in the v3 target strings.
- During boot, if a notification needs to be sent, and the v3
  security parameters are not yet known for a target, skip
  that target, but still send to the others in the list (such
  as the v1 and v2c targets).
- Once the host has booted far enough so the security parameters
  are known (through its normal configuration), include the v3
  targets in any notifications.

This means two scenarios can happen:

1. A host, during boot, only sends v1 and/or v2c notifications
   without security.  Once it's up and running, notifications
   include v3 targets, too.

2. A host has v3 username-to-security-parameter settings in its
   non-volatile configuration.  These are available during boot,
   and can be associated with a notification target from DHCP
   by its security-name.  This might be the best direction to
   go for the future; have security keys in the machines, and
   the actual targets for notification controlled centrally via
   DHCP.

I think this would be a reasonable solution, given that it's
probably not practical to configure the security keys for a host
using DHCP.

Does this help?

--
Mark

> 
> Thanks,
> Bert
> 
> > -----Original Message-----
> > From: Mark Bakke [mailto:mbakke@cisco.com]
> > Sent: maandag 23 september 2002 15:55
> > To: Wijnen, Bert (Bert)
> > Cc: 'dhcwg@ietf.org'; snmpv3@lists. tislabs. com (E-mail);
> > mibs@ops.ietf.org
> > Subject: Re: draft-bakke-dhc-snmp-trap-00.txt
> >
> >
> > I assumed that, when we get to configuring SNMPv3 security,
> > that the names "joe" and "bob" would be separately associated
> > with their keys.  I wanted to keep this particular DHCP
> > option scope to include the notification list, and the names
> > would reference keys configured somewhere else (perhaps another
> > DHCP option, but since I haven't seen encrypted DHCP, this
> > might not work).  In other words, I don't know, but I think
> > that if it was DHCP, it would be better as a separate option.
> >
> > Any ideas?
> >
> > "Wijnen, Bert (Bert)" wrote:
> > >
> > > So in your new proposal, how did/do users Joe and Bob get
> > > defined with their secret keys etc at the agent side?
> > >
> > > Thanks,
> > > Bert
> >
> > --
> > Mark A. Bakke
> > Cisco Systems
> > mbakke@cisco.com
> > 763.398.1054
> >
> _______________________________________________
> dhcwg mailing list
> dhcwg@ietf.org
> https://www1.ietf.org/mailman/listinfo/dhcwg

-- 
Mark A. Bakke
Cisco Systems
mbakke@cisco.com
763.398.1054