[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: MIB



At 05:55 05/06/00 , Wijnen, Bert (Bert) wrote:
>However... it seems to me that the reason you list below is
>not a proper reason to make something a MIN-ACCESS of read-only.
>In my view, you would use the VACM table (can also be used with
>SNMPv1, see RFC2576) to exlcude access without proper 
>authentication and/or privqacy.

In practice, which deployed SNMPv1 implementations support VACM today ?

         My experience is that --zero-- support VACM today and that
--zero-- are likely to support VACM anytime in the near future.  

         However, I think VACM is actually *irrelevant* here.  The reason to 
make the object READ-ONLY unless SNMPv3 is implemented in the agent
is because that OSPF MIB object permits one to downgrade OSPF authentication 
from cryptographic strength to cleartext-password (i.e. zero) strength.  
If  we at least ensure that the object can only be twiddled when a SNMP 
implementation has cryptographic protections (i.e. MD5 Auth) available 
to the operator [1], we significantly reduce the risk to the operational 
OSPF system. [2]

Ran
rja@Inet.org

[1] One cannot legislate that an operator actually enable MD5 Auth as
         that is an operational policy matter.  It is reasonable (IMHO)
         to legislate that an implementation treats the object as RO
         unless it at least has reasonable protections available to the
         operator so the operator has a chance to do the right thing.
[2] This is probably the point where Randy Bush would point out that no
         operator that he knows actually enables any SNMP SETs anyway...