[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Updating the MIB security guidelines
On Fri, 27 Dec 2002, Randy Presuhn wrote:
> I think there should also be some mention of accessible-for-notify
> objects and of notification types.
>
> 1) sensitivity of notifications and their payloads
To address this comment it should suffice to re-word the third section
along the following lines:
-- for all MIBs you must evaluate
Some of the readable objects in this MIB module (including objects
with a MAX-ACCESS clause of accessible-for-notify) may be considered
sensitive or vulnerable in some network environments. It is thus
important to control even GET and/or NOTIFY access to these objects
and possibly to even encrypt the values of these objects when
sending them over the network via SNMP. These are the tables and
objects and their sensitivity/vulnerability:
<list the tables and objects and state why they are sensitive>
> 2) DoS attacks (as described in some of the ADSL MIBs'
> security considerations sections) based on the
> conditions under which notifications are generated.
I'm not so sure that the example you cite is a good one to emulate.
Here is the relevant part of the Security Considerations section
from the ADSL MIB (RFC 2662):
3) ADSL layer connectivity from the ATU-R will permit the subscriber
to manipulate both the ADSL link directly and the AOC/EOC channels
for their own loop. For example, unchecked or unfiltered
fluctuations initiated by the subscriber could generate sufficient
traps to potentially overwhelm either the management interface to the
network or the element manager. Other attacks affecting the ATU-R
portions of the MIB may also be possible.
It was my understanding that accepted practice is to specify that
notification that can be generated by rapidly fluctuating external
conditions must be rate limited so as to avoid overwhelming the
network. See, for example, draft-ietf-atommib-atm2-18.txt, where
the notification atmIntfPvcFailuresTrap is rate-limited by the object
atmIntfPvcNotificationInterval.
It seems to me that the need to have a warning in the security section
about the possibility of DoS attacks from notification floods is
indicative of a design flaw in the MIB module, i.e., lack of a rate
limiting mechanism for the notifications in question.
Or am I missing something?
Mike