913 lines
38 KiB
Plaintext
913 lines
38 KiB
Plaintext
|
SNMP-USER-BASED-SM-MIB DEFINITIONS ::= BEGIN
|
||
|
|
||
|
IMPORTS
|
||
|
MODULE-IDENTITY, OBJECT-TYPE,
|
||
|
OBJECT-IDENTITY,
|
||
|
snmpModules, Counter32 FROM SNMPv2-SMI
|
||
|
TEXTUAL-CONVENTION, TestAndIncr,
|
||
|
RowStatus, RowPointer,
|
||
|
StorageType, AutonomousType FROM SNMPv2-TC
|
||
|
MODULE-COMPLIANCE, OBJECT-GROUP FROM SNMPv2-CONF
|
||
|
SnmpAdminString, SnmpEngineID,
|
||
|
snmpAuthProtocols, snmpPrivProtocols FROM SNMP-FRAMEWORK-MIB;
|
||
|
|
||
|
snmpUsmMIB MODULE-IDENTITY
|
||
|
LAST-UPDATED "200210160000Z" -- 16 Oct 2002, midnight
|
||
|
ORGANIZATION "SNMPv3 Working Group"
|
||
|
CONTACT-INFO "WG-email: snmpv3@lists.tislabs.com
|
||
|
Subscribe: majordomo@lists.tislabs.com
|
||
|
In msg body: subscribe snmpv3
|
||
|
|
||
|
Chair: Russ Mundy
|
||
|
Network Associates Laboratories
|
||
|
postal: 15204 Omega Drive, Suite 300
|
||
|
Rockville, MD 20850-4601
|
||
|
USA
|
||
|
email: mundy@tislabs.com
|
||
|
|
||
|
phone: +1 301-947-7107
|
||
|
|
||
|
Co-Chair: David Harrington
|
||
|
Enterasys Networks
|
||
|
Postal: 35 Industrial Way
|
||
|
P. O. Box 5004
|
||
|
Rochester, New Hampshire 03866-5005
|
||
|
USA
|
||
|
EMail: dbh@enterasys.com
|
||
|
Phone: +1 603-337-2614
|
||
|
|
||
|
Co-editor Uri Blumenthal
|
||
|
Lucent Technologies
|
||
|
postal: 67 Whippany Rd.
|
||
|
Whippany, NJ 07981
|
||
|
USA
|
||
|
email: uri@lucent.com
|
||
|
phone: +1-973-386-2163
|
||
|
|
||
|
Co-editor: Bert Wijnen
|
||
|
Lucent Technologies
|
||
|
postal: Schagen 33
|
||
|
3461 GL Linschoten
|
||
|
Netherlands
|
||
|
email: bwijnen@lucent.com
|
||
|
phone: +31-348-480-685
|
||
|
"
|
||
|
DESCRIPTION "The management information definitions for the
|
||
|
SNMP User-based Security Model.
|
||
|
|
||
|
Copyright (C) The Internet Society (2002). This
|
||
|
version of this MIB module is part of RFC 3414;
|
||
|
see the RFC itself for full legal notices.
|
||
|
"
|
||
|
-- Revision history
|
||
|
|
||
|
REVISION "200210160000Z" -- 16 Oct 2002, midnight
|
||
|
DESCRIPTION "Changes in this revision:
|
||
|
- Updated references and contact info.
|
||
|
- Clarification to usmUserCloneFrom DESCRIPTION
|
||
|
clause
|
||
|
- Fixed 'command responder' into 'command generator'
|
||
|
in last para of DESCRIPTION clause of
|
||
|
usmUserTable.
|
||
|
This revision published as RFC3414.
|
||
|
"
|
||
|
REVISION "199901200000Z" -- 20 Jan 1999, midnight
|
||
|
DESCRIPTION "Clarifications, published as RFC2574"
|
||
|
|
||
|
REVISION "199711200000Z" -- 20 Nov 1997, midnight
|
||
|
DESCRIPTION "Initial version, published as RFC2274"
|
||
|
::= { snmpModules 15 }
|
||
|
|
||
|
-- Administrative assignments ****************************************
|
||
|
|
||
|
usmMIBObjects OBJECT IDENTIFIER ::= { snmpUsmMIB 1 }
|
||
|
usmMIBConformance OBJECT IDENTIFIER ::= { snmpUsmMIB 2 }
|
||
|
|
||
|
-- Identification of Authentication and Privacy Protocols ************
|
||
|
|
||
|
usmNoAuthProtocol OBJECT-IDENTITY
|
||
|
STATUS current
|
||
|
DESCRIPTION "No Authentication Protocol."
|
||
|
::= { snmpAuthProtocols 1 }
|
||
|
|
||
|
usmHMACMD5AuthProtocol OBJECT-IDENTITY
|
||
|
STATUS current
|
||
|
DESCRIPTION "The HMAC-MD5-96 Digest Authentication Protocol."
|
||
|
REFERENCE "- H. Krawczyk, M. Bellare, R. Canetti HMAC:
|
||
|
Keyed-Hashing for Message Authentication,
|
||
|
RFC2104, Feb 1997.
|
||
|
- Rivest, R., Message Digest Algorithm MD5, RFC1321.
|
||
|
"
|
||
|
::= { snmpAuthProtocols 2 }
|
||
|
|
||
|
usmHMACSHAAuthProtocol OBJECT-IDENTITY
|
||
|
STATUS current
|
||
|
DESCRIPTION "The HMAC-SHA-96 Digest Authentication Protocol."
|
||
|
REFERENCE "- H. Krawczyk, M. Bellare, R. Canetti, HMAC:
|
||
|
Keyed-Hashing for Message Authentication,
|
||
|
RFC2104, Feb 1997.
|
||
|
- Secure Hash Algorithm. NIST FIPS 180-1.
|
||
|
"
|
||
|
::= { snmpAuthProtocols 3 }
|
||
|
|
||
|
usmNoPrivProtocol OBJECT-IDENTITY
|
||
|
STATUS current
|
||
|
DESCRIPTION "No Privacy Protocol."
|
||
|
::= { snmpPrivProtocols 1 }
|
||
|
|
||
|
usmDESPrivProtocol OBJECT-IDENTITY
|
||
|
STATUS current
|
||
|
DESCRIPTION "The CBC-DES Symmetric Encryption Protocol."
|
||
|
REFERENCE "- Data Encryption Standard, National Institute of
|
||
|
Standards and Technology. Federal Information
|
||
|
Processing Standard (FIPS) Publication 46-1.
|
||
|
|
||
|
Supersedes FIPS Publication 46,
|
||
|
(January, 1977; reaffirmed January, 1988).
|
||
|
|
||
|
- Data Encryption Algorithm, American National
|
||
|
Standards Institute. ANSI X3.92-1981,
|
||
|
(December, 1980).
|
||
|
|
||
|
- DES Modes of Operation, National Institute of
|
||
|
Standards and Technology. Federal Information
|
||
|
Processing Standard (FIPS) Publication 81,
|
||
|
(December, 1980).
|
||
|
|
||
|
- Data Encryption Algorithm - Modes of Operation,
|
||
|
American National Standards Institute.
|
||
|
ANSI X3.106-1983, (May 1983).
|
||
|
"
|
||
|
::= { snmpPrivProtocols 2 }
|
||
|
|
||
|
-- Textual Conventions ***********************************************
|
||
|
|
||
|
KeyChange ::= TEXTUAL-CONVENTION
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Every definition of an object with this syntax must identify
|
||
|
a protocol P, a secret key K, and a hash algorithm H
|
||
|
that produces output of L octets.
|
||
|
|
||
|
The object's value is a manager-generated, partially-random
|
||
|
value which, when modified, causes the value of the secret
|
||
|
key K, to be modified via a one-way function.
|
||
|
|
||
|
The value of an instance of this object is the concatenation
|
||
|
of two components: first a 'random' component and then a
|
||
|
'delta' component.
|
||
|
|
||
|
The lengths of the random and delta components
|
||
|
are given by the corresponding value of the protocol P;
|
||
|
if P requires K to be a fixed length, the length of both the
|
||
|
random and delta components is that fixed length; if P
|
||
|
allows the length of K to be variable up to a particular
|
||
|
maximum length, the length of the random component is that
|
||
|
maximum length and the length of the delta component is any
|
||
|
length less than or equal to that maximum length.
|
||
|
For example, usmHMACMD5AuthProtocol requires K to be a fixed
|
||
|
length of 16 octets and L - of 16 octets.
|
||
|
usmHMACSHAAuthProtocol requires K to be a fixed length of
|
||
|
20 octets and L - of 20 octets. Other protocols may define
|
||
|
other sizes, as deemed appropriate.
|
||
|
|
||
|
When a requester wants to change the old key K to a new
|
||
|
key keyNew on a remote entity, the 'random' component is
|
||
|
obtained from either a true random generator, or from a
|
||
|
pseudorandom generator, and the 'delta' component is
|
||
|
computed as follows:
|
||
|
|
||
|
- a temporary variable is initialized to the existing value
|
||
|
of K;
|
||
|
- if the length of the keyNew is greater than L octets,
|
||
|
then:
|
||
|
- the random component is appended to the value of the
|
||
|
temporary variable, and the result is input to the
|
||
|
the hash algorithm H to produce a digest value, and
|
||
|
the temporary variable is set to this digest value;
|
||
|
- the value of the temporary variable is XOR-ed with
|
||
|
the first (next) L-octets (16 octets in case of MD5)
|
||
|
of the keyNew to produce the first (next) L-octets
|
||
|
(16 octets in case of MD5) of the 'delta' component.
|
||
|
- the above two steps are repeated until the unused
|
||
|
portion of the keyNew component is L octets or less,
|
||
|
- the random component is appended to the value of the
|
||
|
temporary variable, and the result is input to the
|
||
|
hash algorithm H to produce a digest value;
|
||
|
- this digest value, truncated if necessary to be the same
|
||
|
length as the unused portion of the keyNew, is XOR-ed
|
||
|
with the unused portion of the keyNew to produce the
|
||
|
(final portion of the) 'delta' component.
|
||
|
|
||
|
For example, using MD5 as the hash algorithm H:
|
||
|
|
||
|
iterations = (lenOfDelta - 1)/16; /* integer division */
|
||
|
temp = keyOld;
|
||
|
for (i = 0; i < iterations; i++) {
|
||
|
temp = MD5 (temp || random);
|
||
|
delta[i*16 .. (i*16)+15] =
|
||
|
temp XOR keyNew[i*16 .. (i*16)+15];
|
||
|
}
|
||
|
temp = MD5 (temp || random);
|
||
|
delta[i*16 .. lenOfDelta-1] =
|
||
|
temp XOR keyNew[i*16 .. lenOfDelta-1];
|
||
|
|
||
|
The 'random' and 'delta' components are then concatenated as
|
||
|
described above, and the resulting octet string is sent to
|
||
|
the recipient as the new value of an instance of this object.
|
||
|
|
||
|
At the receiver side, when an instance of this object is set
|
||
|
to a new value, then a new value of K is computed as follows:
|
||
|
|
||
|
- a temporary variable is initialized to the existing value
|
||
|
of K;
|
||
|
- if the length of the delta component is greater than L
|
||
|
octets, then:
|
||
|
- the random component is appended to the value of the
|
||
|
temporary variable, and the result is input to the
|
||
|
hash algorithm H to produce a digest value, and the
|
||
|
temporary variable is set to this digest value;
|
||
|
- the value of the temporary variable is XOR-ed with
|
||
|
the first (next) L-octets (16 octets in case of MD5)
|
||
|
of the delta component to produce the first (next)
|
||
|
L-octets (16 octets in case of MD5) of the new value
|
||
|
of K.
|
||
|
- the above two steps are repeated until the unused
|
||
|
portion of the delta component is L octets or less,
|
||
|
- the random component is appended to the value of the
|
||
|
temporary variable, and the result is input to the
|
||
|
hash algorithm H to produce a digest value;
|
||
|
- this digest value, truncated if necessary to be the same
|
||
|
length as the unused portion of the delta component, is
|
||
|
XOR-ed with the unused portion of the delta component to
|
||
|
produce the (final portion of the) new value of K.
|
||
|
|
||
|
For example, using MD5 as the hash algorithm H:
|
||
|
|
||
|
iterations = (lenOfDelta - 1)/16; /* integer division */
|
||
|
temp = keyOld;
|
||
|
for (i = 0; i < iterations; i++) {
|
||
|
temp = MD5 (temp || random);
|
||
|
keyNew[i*16 .. (i*16)+15] =
|
||
|
temp XOR delta[i*16 .. (i*16)+15];
|
||
|
}
|
||
|
temp = MD5 (temp || random);
|
||
|
keyNew[i*16 .. lenOfDelta-1] =
|
||
|
temp XOR delta[i*16 .. lenOfDelta-1];
|
||
|
|
||
|
The value of an object with this syntax, whenever it is
|
||
|
retrieved by the management protocol, is always the zero
|
||
|
length string.
|
||
|
|
||
|
Note that the keyOld and keyNew are the localized keys.
|
||
|
|
||
|
Note that it is probably wise that when an SNMP entity sends
|
||
|
a SetRequest to change a key, that it keeps a copy of the old
|
||
|
key until it has confirmed that the key change actually
|
||
|
succeeded.
|
||
|
"
|
||
|
SYNTAX OCTET STRING
|
||
|
|
||
|
-- Statistics for the User-based Security Model **********************
|
||
|
|
||
|
usmStats OBJECT IDENTIFIER ::= { usmMIBObjects 1 }
|
||
|
|
||
|
usmStatsUnsupportedSecLevels OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION "The total number of packets received by the SNMP
|
||
|
engine which were dropped because they requested a
|
||
|
securityLevel that was unknown to the SNMP engine
|
||
|
or otherwise unavailable.
|
||
|
"
|
||
|
::= { usmStats 1 }
|
||
|
|
||
|
usmStatsNotInTimeWindows OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION "The total number of packets received by the SNMP
|
||
|
engine which were dropped because they appeared
|
||
|
outside of the authoritative SNMP engine's window.
|
||
|
"
|
||
|
::= { usmStats 2 }
|
||
|
|
||
|
usmStatsUnknownUserNames OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION "The total number of packets received by the SNMP
|
||
|
engine which were dropped because they referenced a
|
||
|
user that was not known to the SNMP engine.
|
||
|
"
|
||
|
::= { usmStats 3 }
|
||
|
|
||
|
usmStatsUnknownEngineIDs OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION "The total number of packets received by the SNMP
|
||
|
engine which were dropped because they referenced an
|
||
|
snmpEngineID that was not known to the SNMP engine.
|
||
|
"
|
||
|
::= { usmStats 4 }
|
||
|
|
||
|
usmStatsWrongDigests OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION "The total number of packets received by the SNMP
|
||
|
engine which were dropped because they didn't
|
||
|
contain the expected digest value.
|
||
|
"
|
||
|
::= { usmStats 5 }
|
||
|
|
||
|
usmStatsDecryptionErrors OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION "The total number of packets received by the SNMP
|
||
|
engine which were dropped because they could not be
|
||
|
decrypted.
|
||
|
"
|
||
|
::= { usmStats 6 }
|
||
|
|
||
|
-- The usmUser Group ************************************************
|
||
|
|
||
|
usmUser OBJECT IDENTIFIER ::= { usmMIBObjects 2 }
|
||
|
|
||
|
usmUserSpinLock OBJECT-TYPE
|
||
|
SYNTAX TestAndIncr
|
||
|
MAX-ACCESS read-write
|
||
|
STATUS current
|
||
|
DESCRIPTION "An advisory lock used to allow several cooperating
|
||
|
Command Generator Applications to coordinate their
|
||
|
use of facilities to alter secrets in the
|
||
|
usmUserTable.
|
||
|
"
|
||
|
::= { usmUser 1 }
|
||
|
|
||
|
-- The table of valid users for the User-based Security Model ********
|
||
|
|
||
|
usmUserTable OBJECT-TYPE
|
||
|
SYNTAX SEQUENCE OF UsmUserEntry
|
||
|
MAX-ACCESS not-accessible
|
||
|
STATUS current
|
||
|
DESCRIPTION "The table of users configured in the SNMP engine's
|
||
|
Local Configuration Datastore (LCD).
|
||
|
|
||
|
To create a new user (i.e., to instantiate a new
|
||
|
conceptual row in this table), it is recommended to
|
||
|
follow this procedure:
|
||
|
|
||
|
1) GET(usmUserSpinLock.0) and save in sValue.
|
||
|
|
||
|
2) SET(usmUserSpinLock.0=sValue,
|
||
|
usmUserCloneFrom=templateUser,
|
||
|
usmUserStatus=createAndWait)
|
||
|
You should use a template user to clone from
|
||
|
which has the proper auth/priv protocol defined.
|
||
|
|
||
|
If the new user is to use privacy:
|
||
|
|
||
|
3) generate the keyChange value based on the secret
|
||
|
privKey of the clone-from user and the secret key
|
||
|
to be used for the new user. Let us call this
|
||
|
pkcValue.
|
||
|
4) GET(usmUserSpinLock.0) and save in sValue.
|
||
|
5) SET(usmUserSpinLock.0=sValue,
|
||
|
usmUserPrivKeyChange=pkcValue
|
||
|
usmUserPublic=randomValue1)
|
||
|
6) GET(usmUserPulic) and check it has randomValue1.
|
||
|
If not, repeat steps 4-6.
|
||
|
|
||
|
If the new user will never use privacy:
|
||
|
|
||
|
7) SET(usmUserPrivProtocol=usmNoPrivProtocol)
|
||
|
|
||
|
If the new user is to use authentication:
|
||
|
|
||
|
8) generate the keyChange value based on the secret
|
||
|
authKey of the clone-from user and the secret key
|
||
|
to be used for the new user. Let us call this
|
||
|
akcValue.
|
||
|
9) GET(usmUserSpinLock.0) and save in sValue.
|
||
|
10) SET(usmUserSpinLock.0=sValue,
|
||
|
usmUserAuthKeyChange=akcValue
|
||
|
usmUserPublic=randomValue2)
|
||
|
11) GET(usmUserPulic) and check it has randomValue2.
|
||
|
If not, repeat steps 9-11.
|
||
|
|
||
|
If the new user will never use authentication:
|
||
|
|
||
|
12) SET(usmUserAuthProtocol=usmNoAuthProtocol)
|
||
|
|
||
|
Finally, activate the new user:
|
||
|
|
||
|
13) SET(usmUserStatus=active)
|
||
|
|
||
|
The new user should now be available and ready to be
|
||
|
used for SNMPv3 communication. Note however that access
|
||
|
to MIB data must be provided via configuration of the
|
||
|
SNMP-VIEW-BASED-ACM-MIB.
|
||
|
|
||
|
The use of usmUserSpinlock is to avoid conflicts with
|
||
|
another SNMP command generator application which may
|
||
|
also be acting on the usmUserTable.
|
||
|
"
|
||
|
::= { usmUser 2 }
|
||
|
|
||
|
usmUserEntry OBJECT-TYPE
|
||
|
SYNTAX UsmUserEntry
|
||
|
MAX-ACCESS not-accessible
|
||
|
STATUS current
|
||
|
DESCRIPTION "A user configured in the SNMP engine's Local
|
||
|
Configuration Datastore (LCD) for the User-based
|
||
|
Security Model.
|
||
|
"
|
||
|
INDEX { usmUserEngineID,
|
||
|
usmUserName
|
||
|
}
|
||
|
::= { usmUserTable 1 }
|
||
|
|
||
|
UsmUserEntry ::= SEQUENCE
|
||
|
{
|
||
|
usmUserEngineID SnmpEngineID,
|
||
|
usmUserName SnmpAdminString,
|
||
|
usmUserSecurityName SnmpAdminString,
|
||
|
usmUserCloneFrom RowPointer,
|
||
|
usmUserAuthProtocol AutonomousType,
|
||
|
usmUserAuthKeyChange KeyChange,
|
||
|
usmUserOwnAuthKeyChange KeyChange,
|
||
|
usmUserPrivProtocol AutonomousType,
|
||
|
usmUserPrivKeyChange KeyChange,
|
||
|
usmUserOwnPrivKeyChange KeyChange,
|
||
|
usmUserPublic OCTET STRING,
|
||
|
usmUserStorageType StorageType,
|
||
|
usmUserStatus RowStatus
|
||
|
}
|
||
|
|
||
|
usmUserEngineID OBJECT-TYPE
|
||
|
SYNTAX SnmpEngineID
|
||
|
MAX-ACCESS not-accessible
|
||
|
STATUS current
|
||
|
DESCRIPTION "An SNMP engine's administratively-unique identifier.
|
||
|
|
||
|
In a simple agent, this value is always that agent's
|
||
|
own snmpEngineID value.
|
||
|
|
||
|
The value can also take the value of the snmpEngineID
|
||
|
of a remote SNMP engine with which this user can
|
||
|
communicate.
|
||
|
"
|
||
|
::= { usmUserEntry 1 }
|
||
|
|
||
|
usmUserName OBJECT-TYPE
|
||
|
SYNTAX SnmpAdminString (SIZE(1..32))
|
||
|
MAX-ACCESS not-accessible
|
||
|
STATUS current
|
||
|
DESCRIPTION "A human readable string representing the name of
|
||
|
the user.
|
||
|
|
||
|
This is the (User-based Security) Model dependent
|
||
|
security ID.
|
||
|
"
|
||
|
::= { usmUserEntry 2 }
|
||
|
|
||
|
usmUserSecurityName OBJECT-TYPE
|
||
|
SYNTAX SnmpAdminString
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION "A human readable string representing the user in
|
||
|
Security Model independent format.
|
||
|
|
||
|
The default transformation of the User-based Security
|
||
|
Model dependent security ID to the securityName and
|
||
|
vice versa is the identity function so that the
|
||
|
securityName is the same as the userName.
|
||
|
"
|
||
|
::= { usmUserEntry 3 }
|
||
|
|
||
|
usmUserCloneFrom OBJECT-TYPE
|
||
|
SYNTAX RowPointer
|
||
|
MAX-ACCESS read-create
|
||
|
STATUS current
|
||
|
DESCRIPTION "A pointer to another conceptual row in this
|
||
|
usmUserTable. The user in this other conceptual
|
||
|
row is called the clone-from user.
|
||
|
|
||
|
When a new user is created (i.e., a new conceptual
|
||
|
row is instantiated in this table), the privacy and
|
||
|
authentication parameters of the new user must be
|
||
|
cloned from its clone-from user. These parameters are:
|
||
|
- authentication protocol (usmUserAuthProtocol)
|
||
|
- privacy protocol (usmUserPrivProtocol)
|
||
|
They will be copied regardless of what the current
|
||
|
value is.
|
||
|
|
||
|
Cloning also causes the initial values of the secret
|
||
|
authentication key (authKey) and the secret encryption
|
||
|
|
||
|
key (privKey) of the new user to be set to the same
|
||
|
values as the corresponding secrets of the clone-from
|
||
|
user to allow the KeyChange process to occur as
|
||
|
required during user creation.
|
||
|
|
||
|
The first time an instance of this object is set by
|
||
|
a management operation (either at or after its
|
||
|
instantiation), the cloning process is invoked.
|
||
|
Subsequent writes are successful but invoke no
|
||
|
action to be taken by the receiver.
|
||
|
The cloning process fails with an 'inconsistentName'
|
||
|
error if the conceptual row representing the
|
||
|
clone-from user does not exist or is not in an active
|
||
|
state when the cloning process is invoked.
|
||
|
|
||
|
When this object is read, the ZeroDotZero OID
|
||
|
is returned.
|
||
|
"
|
||
|
::= { usmUserEntry 4 }
|
||
|
|
||
|
usmUserAuthProtocol OBJECT-TYPE
|
||
|
SYNTAX AutonomousType
|
||
|
MAX-ACCESS read-create
|
||
|
STATUS current
|
||
|
DESCRIPTION "An indication of whether messages sent on behalf of
|
||
|
this user to/from the SNMP engine identified by
|
||
|
usmUserEngineID, can be authenticated, and if so,
|
||
|
the type of authentication protocol which is used.
|
||
|
|
||
|
An instance of this object is created concurrently
|
||
|
with the creation of any other object instance for
|
||
|
the same user (i.e., as part of the processing of
|
||
|
the set operation which creates the first object
|
||
|
instance in the same conceptual row).
|
||
|
|
||
|
If an initial set operation (i.e. at row creation time)
|
||
|
tries to set a value for an unknown or unsupported
|
||
|
protocol, then a 'wrongValue' error must be returned.
|
||
|
|
||
|
The value will be overwritten/set when a set operation
|
||
|
is performed on the corresponding instance of
|
||
|
usmUserCloneFrom.
|
||
|
|
||
|
Once instantiated, the value of such an instance of
|
||
|
this object can only be changed via a set operation to
|
||
|
the value of the usmNoAuthProtocol.
|
||
|
|
||
|
If a set operation tries to change the value of an
|
||
|
|
||
|
existing instance of this object to any value other
|
||
|
than usmNoAuthProtocol, then an 'inconsistentValue'
|
||
|
error must be returned.
|
||
|
|
||
|
If a set operation tries to set the value to the
|
||
|
usmNoAuthProtocol while the usmUserPrivProtocol value
|
||
|
in the same row is not equal to usmNoPrivProtocol,
|
||
|
then an 'inconsistentValue' error must be returned.
|
||
|
That means that an SNMP command generator application
|
||
|
must first ensure that the usmUserPrivProtocol is set
|
||
|
to the usmNoPrivProtocol value before it can set
|
||
|
the usmUserAuthProtocol value to usmNoAuthProtocol.
|
||
|
"
|
||
|
DEFVAL { usmNoAuthProtocol }
|
||
|
::= { usmUserEntry 5 }
|
||
|
|
||
|
usmUserAuthKeyChange OBJECT-TYPE
|
||
|
SYNTAX KeyChange -- typically (SIZE (0 | 32)) for HMACMD5
|
||
|
-- typically (SIZE (0 | 40)) for HMACSHA
|
||
|
MAX-ACCESS read-create
|
||
|
STATUS current
|
||
|
DESCRIPTION "An object, which when modified, causes the secret
|
||
|
authentication key used for messages sent on behalf
|
||
|
of this user to/from the SNMP engine identified by
|
||
|
usmUserEngineID, to be modified via a one-way
|
||
|
function.
|
||
|
|
||
|
The associated protocol is the usmUserAuthProtocol.
|
||
|
The associated secret key is the user's secret
|
||
|
authentication key (authKey). The associated hash
|
||
|
algorithm is the algorithm used by the user's
|
||
|
usmUserAuthProtocol.
|
||
|
|
||
|
When creating a new user, it is an 'inconsistentName'
|
||
|
error for a set operation to refer to this object
|
||
|
unless it is previously or concurrently initialized
|
||
|
through a set operation on the corresponding instance
|
||
|
of usmUserCloneFrom.
|
||
|
|
||
|
When the value of the corresponding usmUserAuthProtocol
|
||
|
is usmNoAuthProtocol, then a set is successful, but
|
||
|
effectively is a no-op.
|
||
|
|
||
|
When this object is read, the zero-length (empty)
|
||
|
string is returned.
|
||
|
|
||
|
The recommended way to do a key change is as follows:
|
||
|
|
||
|
1) GET(usmUserSpinLock.0) and save in sValue.
|
||
|
2) generate the keyChange value based on the old
|
||
|
(existing) secret key and the new secret key,
|
||
|
let us call this kcValue.
|
||
|
|
||
|
If you do the key change on behalf of another user:
|
||
|
|
||
|
3) SET(usmUserSpinLock.0=sValue,
|
||
|
usmUserAuthKeyChange=kcValue
|
||
|
usmUserPublic=randomValue)
|
||
|
|
||
|
If you do the key change for yourself:
|
||
|
|
||
|
4) SET(usmUserSpinLock.0=sValue,
|
||
|
usmUserOwnAuthKeyChange=kcValue
|
||
|
usmUserPublic=randomValue)
|
||
|
|
||
|
If you get a response with error-status of noError,
|
||
|
then the SET succeeded and the new key is active.
|
||
|
If you do not get a response, then you can issue a
|
||
|
GET(usmUserPublic) and check if the value is equal
|
||
|
to the randomValue you did send in the SET. If so, then
|
||
|
the key change succeeded and the new key is active
|
||
|
(probably the response got lost). If not, then the SET
|
||
|
request probably never reached the target and so you
|
||
|
can start over with the procedure above.
|
||
|
"
|
||
|
DEFVAL { ''H } -- the empty string
|
||
|
::= { usmUserEntry 6 }
|
||
|
|
||
|
usmUserOwnAuthKeyChange OBJECT-TYPE
|
||
|
SYNTAX KeyChange -- typically (SIZE (0 | 32)) for HMACMD5
|
||
|
-- typically (SIZE (0 | 40)) for HMACSHA
|
||
|
MAX-ACCESS read-create
|
||
|
STATUS current
|
||
|
DESCRIPTION "Behaves exactly as usmUserAuthKeyChange, with one
|
||
|
notable difference: in order for the set operation
|
||
|
to succeed, the usmUserName of the operation
|
||
|
requester must match the usmUserName that
|
||
|
indexes the row which is targeted by this
|
||
|
operation.
|
||
|
In addition, the USM security model must be
|
||
|
used for this operation.
|
||
|
|
||
|
The idea here is that access to this column can be
|
||
|
public, since it will only allow a user to change
|
||
|
his own secret authentication key (authKey).
|
||
|
Note that this can only be done once the row is active.
|
||
|
|
||
|
When a set is received and the usmUserName of the
|
||
|
requester is not the same as the umsUserName that
|
||
|
indexes the row which is targeted by this operation,
|
||
|
then a 'noAccess' error must be returned.
|
||
|
|
||
|
When a set is received and the security model in use
|
||
|
is not USM, then a 'noAccess' error must be returned.
|
||
|
"
|
||
|
DEFVAL { ''H } -- the empty string
|
||
|
::= { usmUserEntry 7 }
|
||
|
|
||
|
usmUserPrivProtocol OBJECT-TYPE
|
||
|
SYNTAX AutonomousType
|
||
|
MAX-ACCESS read-create
|
||
|
STATUS current
|
||
|
DESCRIPTION "An indication of whether messages sent on behalf of
|
||
|
this user to/from the SNMP engine identified by
|
||
|
usmUserEngineID, can be protected from disclosure,
|
||
|
and if so, the type of privacy protocol which is used.
|
||
|
|
||
|
An instance of this object is created concurrently
|
||
|
with the creation of any other object instance for
|
||
|
the same user (i.e., as part of the processing of
|
||
|
the set operation which creates the first object
|
||
|
instance in the same conceptual row).
|
||
|
|
||
|
If an initial set operation (i.e. at row creation time)
|
||
|
tries to set a value for an unknown or unsupported
|
||
|
protocol, then a 'wrongValue' error must be returned.
|
||
|
|
||
|
The value will be overwritten/set when a set operation
|
||
|
is performed on the corresponding instance of
|
||
|
usmUserCloneFrom.
|
||
|
|
||
|
Once instantiated, the value of such an instance of
|
||
|
this object can only be changed via a set operation to
|
||
|
the value of the usmNoPrivProtocol.
|
||
|
|
||
|
If a set operation tries to change the value of an
|
||
|
existing instance of this object to any value other
|
||
|
than usmNoPrivProtocol, then an 'inconsistentValue'
|
||
|
error must be returned.
|
||
|
|
||
|
Note that if any privacy protocol is used, then you
|
||
|
must also use an authentication protocol. In other
|
||
|
words, if usmUserPrivProtocol is set to anything else
|
||
|
than usmNoPrivProtocol, then the corresponding instance
|
||
|
of usmUserAuthProtocol cannot have a value of
|
||
|
|
||
|
usmNoAuthProtocol. If it does, then an
|
||
|
'inconsistentValue' error must be returned.
|
||
|
"
|
||
|
DEFVAL { usmNoPrivProtocol }
|
||
|
::= { usmUserEntry 8 }
|
||
|
|
||
|
usmUserPrivKeyChange OBJECT-TYPE
|
||
|
SYNTAX KeyChange -- typically (SIZE (0 | 32)) for DES
|
||
|
MAX-ACCESS read-create
|
||
|
STATUS current
|
||
|
DESCRIPTION "An object, which when modified, causes the secret
|
||
|
encryption key used for messages sent on behalf
|
||
|
of this user to/from the SNMP engine identified by
|
||
|
usmUserEngineID, to be modified via a one-way
|
||
|
function.
|
||
|
|
||
|
The associated protocol is the usmUserPrivProtocol.
|
||
|
The associated secret key is the user's secret
|
||
|
privacy key (privKey). The associated hash
|
||
|
algorithm is the algorithm used by the user's
|
||
|
usmUserAuthProtocol.
|
||
|
|
||
|
When creating a new user, it is an 'inconsistentName'
|
||
|
error for a set operation to refer to this object
|
||
|
unless it is previously or concurrently initialized
|
||
|
through a set operation on the corresponding instance
|
||
|
of usmUserCloneFrom.
|
||
|
|
||
|
When the value of the corresponding usmUserPrivProtocol
|
||
|
is usmNoPrivProtocol, then a set is successful, but
|
||
|
effectively is a no-op.
|
||
|
|
||
|
When this object is read, the zero-length (empty)
|
||
|
string is returned.
|
||
|
See the description clause of usmUserAuthKeyChange for
|
||
|
a recommended procedure to do a key change.
|
||
|
"
|
||
|
DEFVAL { ''H } -- the empty string
|
||
|
::= { usmUserEntry 9 }
|
||
|
|
||
|
usmUserOwnPrivKeyChange OBJECT-TYPE
|
||
|
SYNTAX KeyChange -- typically (SIZE (0 | 32)) for DES
|
||
|
MAX-ACCESS read-create
|
||
|
STATUS current
|
||
|
DESCRIPTION "Behaves exactly as usmUserPrivKeyChange, with one
|
||
|
notable difference: in order for the Set operation
|
||
|
to succeed, the usmUserName of the operation
|
||
|
requester must match the usmUserName that indexes
|
||
|
|
||
|
the row which is targeted by this operation.
|
||
|
In addition, the USM security model must be
|
||
|
used for this operation.
|
||
|
|
||
|
The idea here is that access to this column can be
|
||
|
public, since it will only allow a user to change
|
||
|
his own secret privacy key (privKey).
|
||
|
Note that this can only be done once the row is active.
|
||
|
|
||
|
When a set is received and the usmUserName of the
|
||
|
requester is not the same as the umsUserName that
|
||
|
indexes the row which is targeted by this operation,
|
||
|
then a 'noAccess' error must be returned.
|
||
|
|
||
|
When a set is received and the security model in use
|
||
|
is not USM, then a 'noAccess' error must be returned.
|
||
|
"
|
||
|
DEFVAL { ''H } -- the empty string
|
||
|
::= { usmUserEntry 10 }
|
||
|
|
||
|
usmUserPublic OBJECT-TYPE
|
||
|
SYNTAX OCTET STRING (SIZE(0..32))
|
||
|
MAX-ACCESS read-create
|
||
|
STATUS current
|
||
|
DESCRIPTION "A publicly-readable value which can be written as part
|
||
|
of the procedure for changing a user's secret
|
||
|
authentication and/or privacy key, and later read to
|
||
|
determine whether the change of the secret was
|
||
|
effected.
|
||
|
"
|
||
|
DEFVAL { ''H } -- the empty string
|
||
|
::= { usmUserEntry 11 }
|
||
|
|
||
|
usmUserStorageType OBJECT-TYPE
|
||
|
SYNTAX StorageType
|
||
|
MAX-ACCESS read-create
|
||
|
STATUS current
|
||
|
DESCRIPTION "The storage type for this conceptual row.
|
||
|
|
||
|
Conceptual rows having the value 'permanent' must
|
||
|
allow write-access at a minimum to:
|
||
|
|
||
|
- usmUserAuthKeyChange, usmUserOwnAuthKeyChange
|
||
|
and usmUserPublic for a user who employs
|
||
|
authentication, and
|
||
|
- usmUserPrivKeyChange, usmUserOwnPrivKeyChange
|
||
|
and usmUserPublic for a user who employs
|
||
|
privacy.
|
||
|
|
||
|
Note that any user who employs authentication or
|
||
|
privacy must allow its secret(s) to be updated and
|
||
|
thus cannot be 'readOnly'.
|
||
|
|
||
|
If an initial set operation tries to set the value to
|
||
|
'readOnly' for a user who employs authentication or
|
||
|
privacy, then an 'inconsistentValue' error must be
|
||
|
returned. Note that if the value has been previously
|
||
|
set (implicit or explicit) to any value, then the rules
|
||
|
as defined in the StorageType Textual Convention apply.
|
||
|
|
||
|
It is an implementation issue to decide if a SET for
|
||
|
a readOnly or permanent row is accepted at all. In some
|
||
|
contexts this may make sense, in others it may not. If
|
||
|
a SET for a readOnly or permanent row is not accepted
|
||
|
at all, then a 'wrongValue' error must be returned.
|
||
|
"
|
||
|
DEFVAL { nonVolatile }
|
||
|
::= { usmUserEntry 12 }
|
||
|
|
||
|
usmUserStatus OBJECT-TYPE
|
||
|
SYNTAX RowStatus
|
||
|
MAX-ACCESS read-create
|
||
|
STATUS current
|
||
|
DESCRIPTION "The status of this conceptual row.
|
||
|
|
||
|
Until instances of all corresponding columns are
|
||
|
appropriately configured, the value of the
|
||
|
corresponding instance of the usmUserStatus column
|
||
|
is 'notReady'.
|
||
|
|
||
|
In particular, a newly created row for a user who
|
||
|
employs authentication, cannot be made active until the
|
||
|
corresponding usmUserCloneFrom and usmUserAuthKeyChange
|
||
|
have been set.
|
||
|
|
||
|
Further, a newly created row for a user who also
|
||
|
employs privacy, cannot be made active until the
|
||
|
usmUserPrivKeyChange has been set.
|
||
|
|
||
|
The RowStatus TC [RFC2579] requires that this
|
||
|
DESCRIPTION clause states under which circumstances
|
||
|
other objects in this row can be modified:
|
||
|
|
||
|
The value of this object has no effect on whether
|
||
|
other objects in this conceptual row can be modified,
|
||
|
except for usmUserOwnAuthKeyChange and
|
||
|
usmUserOwnPrivKeyChange. For these 2 objects, the
|
||
|
|
||
|
value of usmUserStatus MUST be active.
|
||
|
"
|
||
|
::= { usmUserEntry 13 }
|
||
|
|
||
|
-- Conformance Information *******************************************
|
||
|
|
||
|
usmMIBCompliances OBJECT IDENTIFIER ::= { usmMIBConformance 1 }
|
||
|
usmMIBGroups OBJECT IDENTIFIER ::= { usmMIBConformance 2 }
|
||
|
|
||
|
-- Compliance statements
|
||
|
|
||
|
usmMIBCompliance MODULE-COMPLIANCE
|
||
|
STATUS current
|
||
|
DESCRIPTION "The compliance statement for SNMP engines which
|
||
|
implement the SNMP-USER-BASED-SM-MIB.
|
||
|
"
|
||
|
|
||
|
MODULE -- this module
|
||
|
MANDATORY-GROUPS { usmMIBBasicGroup }
|
||
|
|
||
|
OBJECT usmUserAuthProtocol
|
||
|
MIN-ACCESS read-only
|
||
|
DESCRIPTION "Write access is not required."
|
||
|
|
||
|
OBJECT usmUserPrivProtocol
|
||
|
MIN-ACCESS read-only
|
||
|
DESCRIPTION "Write access is not required."
|
||
|
::= { usmMIBCompliances 1 }
|
||
|
|
||
|
-- Units of compliance
|
||
|
usmMIBBasicGroup OBJECT-GROUP
|
||
|
OBJECTS {
|
||
|
usmStatsUnsupportedSecLevels,
|
||
|
usmStatsNotInTimeWindows,
|
||
|
usmStatsUnknownUserNames,
|
||
|
usmStatsUnknownEngineIDs,
|
||
|
usmStatsWrongDigests,
|
||
|
usmStatsDecryptionErrors,
|
||
|
usmUserSpinLock,
|
||
|
usmUserSecurityName,
|
||
|
usmUserCloneFrom,
|
||
|
usmUserAuthProtocol,
|
||
|
usmUserAuthKeyChange,
|
||
|
usmUserOwnAuthKeyChange,
|
||
|
usmUserPrivProtocol,
|
||
|
usmUserPrivKeyChange,
|
||
|
usmUserOwnPrivKeyChange,
|
||
|
usmUserPublic,
|
||
|
usmUserStorageType,
|
||
|
usmUserStatus
|
||
|
}
|
||
|
STATUS current
|
||
|
DESCRIPTION "A collection of objects providing for configuration
|
||
|
of an SNMP engine which implements the SNMP
|
||
|
User-based Security Model.
|
||
|
"
|
||
|
::= { usmMIBGroups 1 }
|
||
|
|
||
|
END
|