533 lines
21 KiB
Plaintext
533 lines
21 KiB
Plaintext
|
SNMP-USM-DH-OBJECTS-MIB DEFINITIONS ::= BEGIN
|
||
|
|
||
|
IMPORTS
|
||
|
MODULE-IDENTITY, OBJECT-TYPE,
|
||
|
-- OBJECT-IDENTITY,
|
||
|
experimental, Integer32
|
||
|
FROM SNMPv2-SMI
|
||
|
TEXTUAL-CONVENTION
|
||
|
FROM SNMPv2-TC
|
||
|
MODULE-COMPLIANCE, OBJECT-GROUP
|
||
|
FROM SNMPv2-CONF
|
||
|
usmUserEntry
|
||
|
FROM SNMP-USER-BASED-SM-MIB
|
||
|
SnmpAdminString
|
||
|
FROM SNMP-FRAMEWORK-MIB;
|
||
|
|
||
|
snmpUsmDHObjectsMIB MODULE-IDENTITY
|
||
|
LAST-UPDATED "200003060000Z" -- 6 March 2000, Midnight
|
||
|
ORGANIZATION "Excite@Home"
|
||
|
CONTACT-INFO "Author: Mike StJohns
|
||
|
Postal: Excite@Home
|
||
|
450 Broadway
|
||
|
Redwood City, CA 94063
|
||
|
Email: stjohns@corp.home.net
|
||
|
Phone: +1-650-556-5368"
|
||
|
DESCRIPTION
|
||
|
"The management information definitions for providing forward
|
||
|
secrecy for key changes for the usmUserTable, and for providing a
|
||
|
method for 'kickstarting' access to the agent via a Diffie-Helman
|
||
|
key agreement."
|
||
|
|
||
|
REVISION "200003060000Z"
|
||
|
DESCRIPTION
|
||
|
"Initial version published as RFC 2786."
|
||
|
::= { experimental 101 } -- IANA DHKEY-CHANGE 101
|
||
|
|
||
|
-- Administrative assignments
|
||
|
|
||
|
usmDHKeyObjects OBJECT IDENTIFIER ::= { snmpUsmDHObjectsMIB 1 }
|
||
|
usmDHKeyConformance OBJECT IDENTIFIER ::= { snmpUsmDHObjectsMIB 2 }
|
||
|
|
||
|
-- Textual conventions
|
||
|
|
||
|
DHKeyChange ::= TEXTUAL-CONVENTION
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Upon initialization, or upon creation of a row containing an
|
||
|
object of this type, and after any successful SET of this value, a
|
||
|
GET of this value returns 'y' where y = g^xa MOD p, and where g is
|
||
|
the base from usmDHParameters, p is the prime from
|
||
|
usmDHParameters, and xa is a new random integer selected by the
|
||
|
agent in the interval 2^(l-1) <= xa < 2^l < p-1. 'l' is the
|
||
|
optional privateValueLength from usmDHParameters in bits. If 'l'
|
||
|
is omitted, then xa (and xr below) is selected in the interval 0
|
||
|
<= xa < p-1. y is expressed as an OCTET STRING 'PV' of length 'k'
|
||
|
which satisfies
|
||
|
|
||
|
k
|
||
|
y = SUM 2^(8(k-i)) PV'i
|
||
|
i=1
|
||
|
|
||
|
where PV1,...,PVk are the octets of PV from first to last, and
|
||
|
where PV1 <> 0.
|
||
|
|
||
|
A successful SET consists of the value 'y' expressed as an OCTET
|
||
|
STRING as above concatenated with the value 'z'(expressed as an
|
||
|
OCTET STRING in the same manner as y) where z = g^xr MOD p, where
|
||
|
g, p and l are as above, and where xr is a new random integer
|
||
|
selected by the manager in the interval 2^(l-1) <= xr < 2^l <
|
||
|
p-1. A SET to an object of this type will fail with the error
|
||
|
wrongValue if the current 'y' does not match the 'y' portion of
|
||
|
the value of the varbind for the object. (E.g. GET yout, SET
|
||
|
concat(yin, z), yout <> yin).
|
||
|
|
||
|
Note that the private values xa and xr are never transmitted from
|
||
|
manager to device or vice versa, only the values y and z.
|
||
|
Obviously, these values must be retained until a successful SET on
|
||
|
the associated object.
|
||
|
|
||
|
The shared secret 'sk' is calculated at the agent as sk = z^xa MOD
|
||
|
p, and at the manager as sk = y^xr MOD p.
|
||
|
|
||
|
Each object definition of this type MUST describe how to map from
|
||
|
the shared secret 'sk' to the operational key value used by the
|
||
|
protocols and operations related to the object. In general, if n
|
||
|
bits of key are required, the author suggests using the n
|
||
|
right-most bits of the shared secret as the operational key value."
|
||
|
REFERENCE
|
||
|
"-- Diffie-Hellman Key-Agreement Standard, PKCS #3;
|
||
|
RSA Laboratories, November 1993"
|
||
|
SYNTAX OCTET STRING
|
||
|
|
||
|
-- Diffie Hellman public values
|
||
|
|
||
|
usmDHPublicObjects OBJECT IDENTIFIER ::= { usmDHKeyObjects 1 }
|
||
|
|
||
|
usmDHParameters OBJECT-TYPE
|
||
|
SYNTAX OCTET STRING
|
||
|
MAX-ACCESS read-write
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"The public Diffie-Hellman parameters for doing a Diffie-Hellman
|
||
|
key agreement for this device. This is encoded as an ASN.1
|
||
|
DHParameter per PKCS #3, section 9. E.g.
|
||
|
|
||
|
DHParameter ::= SEQUENCE {
|
||
|
prime INTEGER, -- p
|
||
|
base INTEGER, -- g
|
||
|
privateValueLength INTEGER OPTIONAL }
|
||
|
|
||
|
Implementors are encouraged to use either the values from
|
||
|
Oakley Group 1 or the values of from Oakley Group 2 as specified
|
||
|
in RFC-2409, The Internet Key Exchange, Section 6.1, 6.2 as the
|
||
|
default for this object. Other values may be used, but the
|
||
|
security properties of those values MUST be well understood and
|
||
|
MUST meet the requirements of PKCS #3 for the selection of
|
||
|
Diffie-Hellman primes.
|
||
|
|
||
|
In addition, any time usmDHParameters changes, all values of
|
||
|
type DHKeyChange will change and new random numbers MUST be
|
||
|
generated by the agent for each DHKeyChange object."
|
||
|
REFERENCE
|
||
|
"-- Diffie-Hellman Key-Agreement Standard, PKCS #3,
|
||
|
RSA Laboratories, November 1993
|
||
|
-- The Internet Key Exchange, RFC 2409, November 1998,
|
||
|
Sec 6.1, 6.2"
|
||
|
::= { usmDHPublicObjects 1 }
|
||
|
|
||
|
usmDHUserKeyTable OBJECT-TYPE
|
||
|
SYNTAX SEQUENCE OF UsmDHUserKeyEntry
|
||
|
MAX-ACCESS not-accessible
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"This table augments and extends the usmUserTable and provides
|
||
|
4 objects which exactly mirror the objects in that table with the
|
||
|
textual convention of 'KeyChange'. This extension allows key
|
||
|
changes to be done in a manner where the knowledge of the current
|
||
|
secret plus knowledge of the key change data exchanges (e.g. via
|
||
|
wiretapping) will not reveal the new key."
|
||
|
::= { usmDHPublicObjects 2 }
|
||
|
|
||
|
usmDHUserKeyEntry OBJECT-TYPE
|
||
|
SYNTAX UsmDHUserKeyEntry
|
||
|
MAX-ACCESS not-accessible
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"A row of DHKeyChange objects which augment or replace the
|
||
|
functionality of the KeyChange objects in the base table row."
|
||
|
AUGMENTS { usmUserEntry }
|
||
|
::= {usmDHUserKeyTable 1 }
|
||
|
|
||
|
UsmDHUserKeyEntry ::= SEQUENCE {
|
||
|
usmDHUserAuthKeyChange DHKeyChange,
|
||
|
usmDHUserOwnAuthKeyChange DHKeyChange,
|
||
|
usmDHUserPrivKeyChange DHKeyChange,
|
||
|
usmDHUserOwnPrivKeyChange DHKeyChange
|
||
|
}
|
||
|
|
||
|
usmDHUserAuthKeyChange OBJECT-TYPE
|
||
|
SYNTAX DHKeyChange
|
||
|
MAX-ACCESS read-create
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"The object used to change any given user's Authentication Key
|
||
|
using a Diffie-Hellman key exchange.
|
||
|
|
||
|
The right-most n bits of the shared secret 'sk', where 'n' is the
|
||
|
number of bits required for the protocol defined by
|
||
|
usmUserAuthProtocol, are installed as the operational
|
||
|
authentication key for this row after a successful SET."
|
||
|
::= { usmDHUserKeyEntry 1 }
|
||
|
|
||
|
usmDHUserOwnAuthKeyChange OBJECT-TYPE
|
||
|
SYNTAX DHKeyChange
|
||
|
MAX-ACCESS read-create
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"The object used to change the agents own Authentication Key
|
||
|
using a Diffie-Hellman key exchange.
|
||
|
|
||
|
The right-most n bits of the shared secret 'sk', where 'n' is the
|
||
|
number of bits required for the protocol defined by
|
||
|
usmUserAuthProtocol, are installed as the operational
|
||
|
authentication key for this row after a successful SET."
|
||
|
::= { usmDHUserKeyEntry 2 }
|
||
|
|
||
|
usmDHUserPrivKeyChange OBJECT-TYPE
|
||
|
SYNTAX DHKeyChange
|
||
|
MAX-ACCESS read-create
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"The object used to change any given user's Privacy Key using
|
||
|
a Diffie-Hellman key exchange.
|
||
|
|
||
|
The right-most n bits of the shared secret 'sk', where 'n' is the
|
||
|
number of bits required for the protocol defined by
|
||
|
usmUserPrivProtocol, are installed as the operational privacy key
|
||
|
for this row after a successful SET."
|
||
|
::= { usmDHUserKeyEntry 3 }
|
||
|
|
||
|
usmDHUserOwnPrivKeyChange OBJECT-TYPE
|
||
|
SYNTAX DHKeyChange
|
||
|
MAX-ACCESS read-create
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"The object used to change the agent's own Privacy Key using a
|
||
|
Diffie-Hellman key exchange.
|
||
|
|
||
|
The right-most n bits of the shared secret 'sk', where 'n' is the
|
||
|
number of bits required for the protocol defined by
|
||
|
usmUserPrivProtocol, are installed as the operational privacy key
|
||
|
for this row after a successful SET."
|
||
|
::= { usmDHUserKeyEntry 4 }
|
||
|
|
||
|
usmDHKickstartGroup OBJECT IDENTIFIER ::= { usmDHKeyObjects 2 }
|
||
|
|
||
|
usmDHKickstartTable OBJECT-TYPE
|
||
|
SYNTAX SEQUENCE OF UsmDHKickstartEntry
|
||
|
MAX-ACCESS not-accessible
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"A table of mappings between zero or more Diffie-Helman key
|
||
|
agreement values and entries in the usmUserTable. Entries in this
|
||
|
table are created by providing the associated device with a
|
||
|
Diffie-Helman public value and a usmUserName/usmUserSecurityName
|
||
|
pair during initialization. How these values are provided is
|
||
|
outside the scope of this MIB, but could be provided manually, or
|
||
|
through a configuration file. Valid public value/name pairs
|
||
|
result in the creation of a row in this table as well as the
|
||
|
creation of an associated row (with keys derived as indicated) in
|
||
|
the usmUserTable. The actual access the related usmSecurityName
|
||
|
has is dependent on the entries in the VACM tables. In general,
|
||
|
an implementor will specify one or more standard security names
|
||
|
and will provide entries in the VACM tables granting various
|
||
|
levels of access to those names. The actual content of the VACM
|
||
|
|
||
|
table is beyond the scope of this MIB.
|
||
|
|
||
|
Note: This table is expected to be readable without authentication
|
||
|
using the usmUserSecurityName 'dhKickstart'. See the conformance
|
||
|
statements for details."
|
||
|
::= { usmDHKickstartGroup 1 }
|
||
|
|
||
|
usmDHKickstartEntry OBJECT-TYPE
|
||
|
SYNTAX UsmDHKickstartEntry
|
||
|
MAX-ACCESS not-accessible
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"An entry in the usmDHKickstartTable. The agent SHOULD either
|
||
|
delete this entry or mark it as inactive upon a successful SET of
|
||
|
any of the KeyChange-typed objects in the usmUserEntry or upon a
|
||
|
successful SET of any of the DHKeyChange-typed objects in the
|
||
|
usmDhKeyChangeEntry where the related usmSecurityName (e.g. row of
|
||
|
usmUserTable or row of ushDhKeyChangeTable) equals this entry's
|
||
|
usmDhKickstartSecurityName. In otherwords, once you've changed
|
||
|
one or more of the keys for a row in usmUserTable with a
|
||
|
particular security name, the row in this table with that same
|
||
|
security name is no longer useful or meaningful."
|
||
|
INDEX { usmDHKickstartIndex }
|
||
|
::= {usmDHKickstartTable 1 }
|
||
|
|
||
|
UsmDHKickstartEntry ::= SEQUENCE {
|
||
|
usmDHKickstartIndex Integer32,
|
||
|
usmDHKickstartMyPublic OCTET STRING,
|
||
|
usmDHKickstartMgrPublic OCTET STRING,
|
||
|
usmDHKickstartSecurityName SnmpAdminString
|
||
|
}
|
||
|
|
||
|
usmDHKickstartIndex OBJECT-TYPE
|
||
|
SYNTAX Integer32 (1..2147483647)
|
||
|
MAX-ACCESS not-accessible
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Index value for this row."
|
||
|
::= { usmDHKickstartEntry 1 }
|
||
|
|
||
|
usmDHKickstartMyPublic OBJECT-TYPE
|
||
|
SYNTAX OCTET STRING
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"The agent's Diffie-Hellman public value for this row. At
|
||
|
|
||
|
initialization, the agent generates a random number and derives
|
||
|
its public value from that number. This public value is published
|
||
|
here. This public value 'y' equals g^r MOD p where g is the from
|
||
|
the set of Diffie-Hellman parameters, p is the prime from those
|
||
|
parameters, and r is a random integer selected by the agent in the
|
||
|
interval 2^(l-1) <= r < p-1 < 2^l. If l is unspecified, then r is
|
||
|
a random integer selected in the interval 0 <= r < p-1
|
||
|
|
||
|
The public value is expressed as an OCTET STRING 'PV' of length
|
||
|
'k' which satisfies
|
||
|
|
||
|
k
|
||
|
y = SUM 2^(8(k-i)) PV'i
|
||
|
i = 1
|
||
|
|
||
|
where PV1,...,PVk are the octets of PV from first to last, and
|
||
|
where PV1 != 0.
|
||
|
|
||
|
The following DH parameters (Oakley group #2, RFC 2409, sec 6.1,
|
||
|
6.2) are used for this object:
|
||
|
|
||
|
g = 2
|
||
|
p = FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1
|
||
|
29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD
|
||
|
EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245
|
||
|
E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED
|
||
|
EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE65381
|
||
|
FFFFFFFF FFFFFFFF
|
||
|
l=1024
|
||
|
"
|
||
|
REFERENCE
|
||
|
"-- Diffie-Hellman Key-Agreement Standard, PKCS#3v1.4;
|
||
|
RSA Laboratories, November 1993
|
||
|
-- The Internet Key Exchange, RFC2409;
|
||
|
Harkins, D., Carrel, D.; November 1998"
|
||
|
::= { usmDHKickstartEntry 2 }
|
||
|
|
||
|
usmDHKickstartMgrPublic OBJECT-TYPE
|
||
|
SYNTAX OCTET STRING
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"The manager's Diffie-Hellman public value for this row. Note
|
||
|
that this value is not set via the SNMP agent, but may be set via
|
||
|
some out of band method, such as the device's configuration file.
|
||
|
|
||
|
The manager calculates this value in the same manner and using the
|
||
|
same parameter set as the agent does. E.g. it selects a random
|
||
|
number 'r', calculates y = g^r mod p and provides 'y' as the
|
||
|
public number expressed as an OCTET STRING. See
|
||
|
usmDHKickstartMyPublic for details.
|
||
|
|
||
|
When this object is set with a valid value during initialization,
|
||
|
a row is created in the usmUserTable with the following values:
|
||
|
|
||
|
usmUserEngineID localEngineID
|
||
|
usmUserName [value of usmDHKickstartSecurityName]
|
||
|
usmUserSecurityName [value of usmDHKickstartSecurityName]
|
||
|
usmUserCloneFrom ZeroDotZero
|
||
|
usmUserAuthProtocol usmHMACMD5AuthProtocol
|
||
|
usmUserAuthKeyChange -- derived from set value
|
||
|
usmUserOwnAuthKeyChange -- derived from set value
|
||
|
usmUserPrivProtocol usmDESPrivProtocol
|
||
|
usmUserPrivKeyChange -- derived from set value
|
||
|
usmUserOwnPrivKeyChange -- derived from set value
|
||
|
usmUserPublic ''
|
||
|
usmUserStorageType permanent
|
||
|
usmUserStatus active
|
||
|
|
||
|
A shared secret 'sk' is calculated at the agent as sk =
|
||
|
mgrPublic^r mod p where r is the agents random number and p is the
|
||
|
DH prime from the common parameters. The underlying privacy key
|
||
|
for this row is derived from sk by applying the key derivation
|
||
|
function PBKDF2 defined in PKCS#5v2.0 with a salt of 0xd1310ba6,
|
||
|
and iterationCount of 500, a keyLength of 16 (for
|
||
|
usmDESPrivProtocol), and a prf (pseudo random function) of
|
||
|
'id-hmacWithSHA1'. The underlying authentication key for this row
|
||
|
is derived from sk by applying the key derivation function PBKDF2
|
||
|
with a salt of 0x98dfb5ac , an interation count of 500, a
|
||
|
keyLength of 16 (for usmHMAC5AuthProtocol), and a prf of
|
||
|
'id-hmacWithSHA1'. Note: The salts are the first two words in the
|
||
|
ks0 [key schedule 0] of the BLOWFISH cipher from 'Applied
|
||
|
Cryptography' by Bruce Schnier - they could be any relatively
|
||
|
random string of bits.
|
||
|
|
||
|
The manager can use its knowledge of its own random number and the
|
||
|
agent's public value to kickstart its access to the agent in a
|
||
|
secure manner. Note that the security of this approach is
|
||
|
directly related to the strength of the authorization security of
|
||
|
the out of band provisioning of the managers public value
|
||
|
(e.g. the configuration file), but is not dependent at all on the
|
||
|
strength of the confidentiality of the out of band provisioning
|
||
|
data."
|
||
|
REFERENCE
|
||
|
"-- Password-Based Cryptography Standard, PKCS#5v2.0;
|
||
|
RSA Laboratories, March 1999
|
||
|
-- Applied Cryptography, 2nd Ed.; B. Schneier,
|
||
|
Counterpane Systems; John Wiley & Sons, 1996"
|
||
|
::= { usmDHKickstartEntry 3 }
|
||
|
|
||
|
usmDHKickstartSecurityName OBJECT-TYPE
|
||
|
SYNTAX SnmpAdminString
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"The usmUserName and usmUserSecurityName in the usmUserTable
|
||
|
associated with this row. This is provided in the same manner and
|
||
|
at the same time as the usmDHKickstartMgrPublic value -
|
||
|
e.g. possibly manually, or via the device's configuration file."
|
||
|
::= { usmDHKickstartEntry 4 }
|
||
|
|
||
|
-- Conformance Information
|
||
|
|
||
|
usmDHKeyMIBCompliances OBJECT IDENTIFIER ::= { usmDHKeyConformance 1 }
|
||
|
usmDHKeyMIBGroups OBJECT IDENTIFIER ::= { usmDHKeyConformance 2 }
|
||
|
|
||
|
-- Compliance statements
|
||
|
|
||
|
usmDHKeyMIBCompliance MODULE-COMPLIANCE
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"The compliance statement for this module."
|
||
|
MODULE
|
||
|
GROUP usmDHKeyMIBBasicGroup
|
||
|
DESCRIPTION
|
||
|
"This group MAY be implemented by any agent which
|
||
|
implements the usmUserTable and which wishes to provide the
|
||
|
ability to change user and agent authentication and privacy
|
||
|
keys via Diffie-Hellman key exchanges."
|
||
|
|
||
|
GROUP usmDHKeyParamGroup
|
||
|
DESCRIPTION
|
||
|
"This group MUST be implemented by any agent which
|
||
|
implements a MIB containing the DHKeyChange Textual
|
||
|
Convention defined in this module."
|
||
|
|
||
|
GROUP usmDHKeyKickstartGroup
|
||
|
DESCRIPTION
|
||
|
"This group MAY be implemented by any agent which
|
||
|
implements the usmUserTable and which wishes the ability to
|
||
|
populate the USM table based on out-of-band provided DH
|
||
|
ignition values.
|
||
|
|
||
|
Any agent implementing this group is expected to provide
|
||
|
preinstalled entries in the vacm tables as follows:
|
||
|
|
||
|
In the usmUserTable: This entry allows access to the
|
||
|
system and dhKickstart groups
|
||
|
|
||
|
usmUserEngineID localEngineID
|
||
|
usmUserName 'dhKickstart'
|
||
|
usmUserSecurityName 'dhKickstart'
|
||
|
usmUserCloneFrom ZeroDotZero
|
||
|
usmUserAuthProtocol none
|
||
|
usmUserAuthKeyChange ''
|
||
|
usmUserOwnAuthKeyChange ''
|
||
|
usmUserPrivProtocol none
|
||
|
usmUserPrivKeyChange ''
|
||
|
usmUserOwnPrivKeyChange ''
|
||
|
usmUserPublic ''
|
||
|
usmUserStorageType permanent
|
||
|
usmUserStatus active
|
||
|
|
||
|
In the vacmSecurityToGroupTable: This maps the initial
|
||
|
user into the accessible objects.
|
||
|
|
||
|
vacmSecurityModel 3 (USM)
|
||
|
vacmSecurityName 'dhKickstart'
|
||
|
vacmGroupName 'dhKickstart'
|
||
|
vacmSecurityToGroupStorageType permanent
|
||
|
vacmSecurityToGroupStatus active
|
||
|
|
||
|
In the vacmAccessTable: Group name to view name translation.
|
||
|
|
||
|
vacmGroupName 'dhKickstart'
|
||
|
vacmAccessContextPrefix ''
|
||
|
vacmAccessSecurityModel 3 (USM)
|
||
|
vacmAccessSecurityLevel noAuthNoPriv
|
||
|
vacmAccessContextMatch exact
|
||
|
vacmAccessReadViewName 'dhKickRestricted'
|
||
|
vacmAccessWriteViewName ''
|
||
|
vacmAccessNotifyViewName 'dhKickRestricted'
|
||
|
vacmAccessStorageType permanent
|
||
|
vacmAccessStatus active
|
||
|
|
||
|
In the vacmViewTreeFamilyTable: Two entries to allow the
|
||
|
initial entry to access the system and kickstart groups.
|
||
|
|
||
|
vacmViewTreeFamilyViewName 'dhKickRestricted'
|
||
|
vacmViewTreeFamilySubtree 1.3.6.1.2.1.1 (system)
|
||
|
vacmViewTreeFamilyMask ''
|
||
|
|
||
|
vacmViewTreeFamilyType 1
|
||
|
vacmViewTreeFamilyStorageType permanent
|
||
|
vacmViewTreeFamilyStatus active
|
||
|
|
||
|
vacmViewTreeFamilyViewName 'dhKickRestricted'
|
||
|
vacmViewTreeFamilySubtree (usmDHKickstartTable OID)
|
||
|
vacmViewTreeFamilyMask ''
|
||
|
vacmViewTreeFamilyType 1
|
||
|
vacmViewTreeFamilyStorageType permanent
|
||
|
vacmViewTreeFamilyStatus active
|
||
|
"
|
||
|
|
||
|
OBJECT usmDHParameters
|
||
|
MIN-ACCESS read-only
|
||
|
DESCRIPTION
|
||
|
"It is compliant to implement this object as read-only for
|
||
|
any device."
|
||
|
::= { usmDHKeyMIBCompliances 1 }
|
||
|
|
||
|
-- Units of Compliance
|
||
|
|
||
|
usmDHKeyMIBBasicGroup OBJECT-GROUP
|
||
|
OBJECTS {
|
||
|
usmDHUserAuthKeyChange,
|
||
|
usmDHUserOwnAuthKeyChange,
|
||
|
usmDHUserPrivKeyChange,
|
||
|
usmDHUserOwnPrivKeyChange
|
||
|
}
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
""
|
||
|
::= { usmDHKeyMIBGroups 1 }
|
||
|
|
||
|
usmDHKeyParamGroup OBJECT-GROUP
|
||
|
OBJECTS {
|
||
|
usmDHParameters
|
||
|
}
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"The mandatory object for all MIBs which use the DHKeyChange
|
||
|
textual convention."
|
||
|
::= { usmDHKeyMIBGroups 2 }
|
||
|
|
||
|
usmDHKeyKickstartGroup OBJECT-GROUP
|
||
|
OBJECTS {
|
||
|
usmDHKickstartMyPublic,
|
||
|
usmDHKickstartMgrPublic,
|
||
|
usmDHKickstartSecurityName
|
||
|
}
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"The objects used for kickstarting one or more SNMPv3 USM
|
||
|
associations via a configuration file or other out of band,
|
||
|
non-confidential access."
|
||
|
::= { usmDHKeyMIBGroups 3 }
|
||
|
|
||
|
END
|