Browse Prior Art Database

Security Protocols for version 2 of the Simple Network Management Protocol (SNMPv2) (RFC1446)

IP.com Disclosure Number: IPCOM000002274D
Original Publication Date: 1993-Apr-01
Included in the Prior Art Database: 2000-Sep-12

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

J. Galvin: AUTHOR [+2]

Abstract

A network management system contains: several (potentially many) nodes, each with a processing entity, termed an agent, which has access to management instrumentation; at least one management station; and, a management protocol, used to convey management information between the agents and management stations. Operations of the protocol are carried out under an administrative framework which defines both authentication and authorization policies.

This text was extracted from a ASCII document.
This is the abbreviated version, containing approximately 3% of the total text.

Network Working Group J. Galvin

Request for Comments: 1446 Trusted Information Systems

K. McCloghrie

Hughes LAN Systems

April 1993

Security Protocols

for version 2 of the

Simple Network Management Protocol (SNMPv2)

Status of this Memo

This RFC specifes an IAB standards track protocol for the

Internet community, and requests discussion and suggestions

for improvements. Please refer to the current edition of the

"IAB Official Protocol Standards" for the standardization

state and status of this protocol. Distribution of this memo

is unlimited.

Table of Contents

1 Introduction .......................................... 2

1.1 A Note on Terminology ............................... 3

1.2 Threats ............................................. 4

1.3 Goals and Constraints ............................... 5

1.4 Security Services ................................... 6

1.5 Mechanisms .......................................... 7

1.5.1 Message Digest Algorithm .......................... 8

1.5.2 Symmetric Encryption Algorithm .................... 9

2 SNMPv2 Party .......................................... 11

3 Digest Authentication Protocol ........................ 14

3.1 Generating a Message ................................ 16

3.2 Receiving a Message ................................. 18

4 Symmetric Privacy Protocol ............................ 21

4.1 Generating a Message ................................ 21

4.2 Receiving a Message ................................. 22

5 Clock and Secret Distribution ......................... 24

5.1 Initial Configuration ............................... 25

5.2 Clock Distribution .................................. 28

5.3 Clock Synchronization ............................... 29

5.4 Secret Distribution ................................. 31

5.5 Crash Recovery ...................................... 34

6 Security Considerations ............................... 37

6.1 Recommended Practices ............................... 37

6.2 Conformance ......................................... 39

...