[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: FW: Updating the MIB security guidelines
>>>>> Wijnen, Bert (Bert) writes:
Bert> The proposal below only references RFC2570bis.
Bert> What do people think of the below? I would like to seem
Bert> comments/responses/support/concerns rather sooner than later.
Looks good. Some minor comments below.
> x. Security Considerations
>
> -- if you have any read-write and/or read-create objects, please
> -- describe their specific sensitivity or vulnerability.
> -- RFC 2669 has a very good example.
>
> There are a number of management objects defined in this MIB module
> with a MAX-ACCESS clause of read-write and/or read-create. Such
> objects may be considered sensitive or vulnerable in some network
> environments. The support for SET operations in a non-secure
> environment without proper protection can have a negative effect on
> network operations. These are the tables and objects and their
> sensitivity/vulnerability:
>
> <list the tables and objects and state why they are sensitive>
>
> -- else if there are no read-write objects in your MIB module
>
> There are no management objects defined in this MIB module that have
> a MAX-ACCESS clause of read-write and/or read-create. So, if this
> MIB module is implemented correctly, then there is no risk that an
> intruder can alter or create any management objects of this MIB
> module via direct SNMP SET operations.
I think you should say "alter, create or delete" instead of just
"alter or create".
> -- for all MIBs you must evaluate
>
> There are a number of managed objects in this MIB module with a
> MAX-ACCESS claise of read-only and/or notify-only. Some of these
I think the evaluation which readable information is sensitive also
applies to read-write and read-create objects since they are readable
as well. So probably it is simpler to just say that the following
evaluation has to be done for _all_ managed objects.
> objects may be considered sensitive or vulnerable in some network
> environments. It is thus important to control even GET access to
> these objects and possibly to even encrypt the values of these
> objects when sending them over the network via SNMP. These are
> the tables and objects and their sensitivity/vulnerability:
>
> <list the tables and objects and state why they are sensitive>
>
> SNMP versions prior to SNMPv3 did not include adequate security.
> Even if the network itself is secure (for example by using IPSec),
> even then, there is no control as to who on the secure network
> is allowed to access and GET/SET (read/change/create/delete) the
> objects in this MIB module.
>
> It is RECOMMENDED that implementers consider the security features
> as provided by the SNMPv3 framework (see [RFC3410], section 8),
> inluding full support for the SNMPv3 cryptographic mechanisms
including
> (for authentication and privacy).
>
> Further, deployment of SNMP versions prior to SNMPv3 is NOT
> RECOMMENDED. Instead, it is RECOMMENDED to deploy SNMPv3 and to
> enable cryptographic security. It is a customer/operator
> responsibility to ensure that the SNMP entity giving access to
> an instance of this MIB module, is properly configured to give
> access to the objects only to those principals (users) that have
> legitimate rights to indeed GET or SET (change/create/delete) them.
/js
--
Juergen Schoenwaelder <http://www.informatik.uni-osnabrueck.de/schoenw/>