* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Chapter 8
Cyber-security regulation wikipedia , lookup
Access control wikipedia , lookup
Wireless security wikipedia , lookup
Post-quantum cryptography wikipedia , lookup
Distributed firewall wikipedia , lookup
Security-focused operating system wikipedia , lookup
Computer security wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Unix security wikipedia , lookup
Mobile security wikipedia , lookup
Information security wikipedia , lookup
Network Management Security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Outline Basic Concepts of SNMP SNMPv1 Community Facility SNMPv3 2 The Internet Standard Management Framework SNMP network management consists of four parts: Management Information Base (MIB) A map of the hierarchical order of all managed objects and how they are accessed Structure of Management Information (SMI) Rules specifying the format used to define objects managed on the network that the SNMP protocol accesses SNMP Protocol Defines format of messages exchanged by management systems and agents. Specifies the Get, GetNext, Set, and Trap operations Security and administration capabilities The addition of these capabilities represents the major enhancement in SNMPv3 over SNMPv2 3 Basic Concepts of SNMP An integrated collection of tools for network monitoring and control. Single operator interface Minimal amount of separate equipment. Software and network communications capability built into the existing equipment SNMP key elements: Management station Management agent Management information base Network Management protocol Get, Set and Notify 4 Management Information Bases (MIB) SNMP agent is software that runs on a piece of network equipment (host, router, printer, or others) and that maintains information about its configuration and current state in a database Information in the database is described by Management Information Bases (MIBs) The MIB specifies the managed objects 5 Management Information Bases (MIB) The MIB is a text file that describes managed objects using the syntax of ASN.1 (Abstract Syntax Notation 1) ASN.1 is a formal language for describing data and its properties In Linux, MIB files are in the directory /usr/share/snmp/mibs Multiple MIB files MIB-II (defined in RFC 1213) defines the managed objects of TCP/IP networks 6 Managed Objects Each managed object is assigned an object identifier (OID) The OID is specified in a MIB file. An OID can be represented as a sequence of integers separated by decimal points or by a text string. Example: 1.3.6.1.2.1.4.6. iso.org.dod.internet.mgmt.mib-2.ip.ipForwData When an SNMP manager requests an object, it sends the OID to the SNMP agent. 7 MIB Example ipForwDatagrams OBJECT-TYPE SYNTAX Counter ACCESS read-only STATUS mandatory DESCRIPTION "The number of input datagrams for which this entity was not their final IP destination, as a result of which an attempt was made to find a route to forward them to that final destination. In entities which do not act as IP Gateways, this counter will include only those packets which were Source-Routed via this entity, and the SourceRoute option processing was successful." ::= { ip 6 } 8 Protocol context of SNMP 9 Proxy Configuration 10 11 SNMP v1 and v2 Trap – an unsolicited message (reporting an alarm condition) SNMPv1 is ”connectionless” since it utilizes UDP (rather than TCP) as the transport layer protocol. SNMPv2 allows the use of TCP for ”reliable, connection-oriented” service. 12 Comparison of SNMPv1 and SNMPv2 SNMPv1 PDU SNMPv2 PDU Direction Description GetRequest GetRequest Manager to agent Request value for each listed object GetRequest GetRequest Manager to agent Request next value for each listed object ------ GetBulkRequest Manager to agent Request multiple values SetRequest SetRequest Manager to agent Set value for each listed object ------ InformRequest Manager to manager Transmit unsolicited information GetResponse Response Agent to manager or Manage to manager(SNMPv2) Respond to manager request Trap SNMPv2-Trap Agent to manager Transmit unsolicited information 13 SNMPv1 Community Facility SNMP Community – Relationship between an SNMP agent and SNMP managers. Three aspect of agent control: Authentication service Access policy Proxy service 14 SNMPv1 Administrative Concepts 15 SNMPv3 SNMPv3 defines a security capability to be used in conjunction with SNMPv1 or v2 16 SNMPv3 Flow 17 Typical SNMP Manager 18 Typical SNMP Agent 19 User Security Model (USM) Designed to secure against: Modification of information Masquerade Message stream modification Disclosure Not intended to secure against: Denial of Service (DoS attack) Traffic analysis 20 SNMP3 Message Format with USM 21 USM Encryption Authentication (using authKey) HMAC-MD5-96 HMAC-SHA1-96 Encryption (using privKey) DES CBC Uses first 64 bits of the 16-octet privKey Last 64 bits used as IV to DES CBC Key values not accessible from SNMP 22 Authoritative Engine SNMP messages with payloads that expect a response (Get…, Set, Inform) Receiver of message is authoritative SNMP messages with payload that does not expect response (Trap, Response, Report) Sender is authoritative 23 Key Localization Allows single user to own keys stored in multiple engines Key localized to each authoritative engine using hash functions Avoids problem of a single key being stored in many places Greatly slows brute force attack 24 Key Localization 25 Timeliness Determined by a clock kept at the authoritative engine When authoritative engine sends a message, it includes the current clock value Nonauthoritative agent synchronizes on clock value When nonauthoritative engine sends a message, it includes the estimated destination clock value These procedures allow assessing message timeliness 26 View-Based Access Control Model (VACM) VACM has two characteristics: Determines whether access to a managed object should be allowed. Make use of an MIB that: Defines the access control policy for this agent. Makes it possible for remote configuration to be used. 27 Access control decision 28 SNMPv3 Security SNMPv3 solves SNMP security problems, right? NOT! Decent security implementation, but reality is: SNMPv1 still holds ~95% of the market (2005) Even SNMPv2 not widely deployed Upgrading to SNMPv3 is difficult and costly (sort of like moving from WinXP to WinVista all at once) There is the issue of proxies and foreign clients SNMPv3 is the clear long-term choice 29