100 likes | 178 Views
SBSM BOF Session-Based Security Model for SNMPv3. Wes Hardaker David T. Perkins November, 2004 (draft-hardaker-snmp-sbsm-03.txt). SBSM Protocol Proposal. Current draft: draft-hardaker-snmp-sbsm-03.txt Creates a “session” between two points 3 phases to the session:
E N D
SBSM BOFSession-Based Security Model for SNMPv3 Wes Hardaker David T. Perkins November, 2004 (draft-hardaker-snmp-sbsm-03.txt)
SBSM Protocol Proposal • Current draft: • draft-hardaker-snmp-sbsm-03.txt • Creates a “session” between two points • 3 phases to the session: • Initialization (Security setup, authentication) • Running • Closing • Initialization PDUs sent are GET/REPORT PDUs, but the application never sees them. • Similar to EngineID discovery today
Session Message Flow Initialization Running SNMP PDU Init 1 Closing Init 2 Init 1 Running SNMP PDU SNMP PDU Close Close Init 1 SNMP App SBSM Initiator SBSM Responder SNMP App Traffic protected by SBSM ... Note: Other SNMPv3 components (MP, etc) not shown but exist where expected
SBSM Disadvantages • Based on SNMPv3 security model parameters
SBSM Advantages • Reuses existing transports • (UDP, TCP, IPX, AAL5, … +future) • SNMPv3 architecture compliant • SNMPv3 application compliant • Reuses Existing Authentication Systems • Local accounts, SSH, X.509, … • No “must have” system to make it work • Extensible Authentication Definitions • New authentication types = 1-2 pages
SBSM Advantages • Supports compression • Supports identity disclosure protection • Supports true replay protection • Reuses SNMPv3 where possible • Same message integrity (MD5, SHA-1) • Same encryption (DES, AES) • Flexible enough to negotiate needs • Rigid enough not to make negotiation a complex burden
SBSM Advantages • Based on a mathematically proven cryptographic exchange protocol • SIGMA (also used in other protocols)
SBSM Implementation Report • Implementation completed for: • Local account authentication • Key negotiation • Authentication Algorithm Negotiation • Encryption Algorithm Negotiation • Total time to implement in Net-SNMP:
SBSM Implementation Report • Implementation completed for: • Local account authentication • Key negotiation • Authentication Algorithm Negotiation • Encryption Algorithm Negotiation • Total time to implement in Net-SNMP: • 19.5 Hours
Questions? Wes Hardaker David T. Perkins November, 2004 (draft-hardaker-snmp-sbsm-03.txt)