Slide 1 Replacing TripWire with SNMPv3 Matthew G. Marsh Chief Scientist of the NEbraskaCERT.

Slides:



Advertisements
Similar presentations
Management Information Base for Version 2 of the Simple Network Management Protocol Presented by Zhou Ji (MIB for SNMPv2) By SNMPv2 Working Group.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Chapter 19: Network Management Business Data Communications, 5e.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
TCP/IP Protocol Suite 1 Chapter 21 Upon completion you will be able to: Network Management: SNMP Understand the SNMP manager and the SNMP agent Understand.
CSEE W4140 Networking Laboratory Lecture 11: SNMP Jong Yul Kim
1 SNMP Simple Network Management Protocol. 2 SNMP Overview Define mechanism for remote management of network devices (routers, bridges, etc.) Fundamental.
Network Management Definition "...deploying and coordinating resources in order to plan, operate, administer, analyze, evaluate, design and expand communication.
COMP4690, by Dr Xiaowen Chu, HKBU
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
SNMP & MIME Rizwan Rehman, CCS, DU. Basic tasks that fall under this category are: What is Network Management? Fault Management Dealing with problems.
SNMP Simple Network Management Protocol
Guide to TCP/IP, Third Edition Chapter 11: Monitoring and Managing IP Networks.
SNMPv3 Yen-Cheng Chen Department of Information Management National Chi Nan University
Introduction to SNMP AfNOG 11, Kigali/Rwanda.
These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
SNMP (Simple Network Management Protocol) Jon Sevy Geometric and Intelligent Computing Laboratory Department of Mathematics and Computer Science Drexel.
ENS 1 SNMP M Clements. ENS 2 Simple Network Management Protocol Manages elements in networks – E.g. routers, switches, IP phones, printers etc. Uses manager.
Chapter 6 Overview Simple Network Management Protocol
Chapter 2  Overview of Network Management 1 Chapter 2 Overview  Why is network mgmt necessary?  Network managers job  Network management vocabulary.
Emanuele Pasqualucci Extending AppManager Monitoring with the SNMP Toolkit.
Network Protocols UNIT IV – NETWORK MANAGEMENT FUNDAMENTALS.
SNMP ( Simple Network Management Protocol ) based Network Management.
Title: HP OpenView Network Node Manager SPI for SNMPv3 Session #: 326 Speakers: Jeff Scheaffer, HP OpenView NSM David Reid, SNMP Research.
SNMP Simple Network Management Protocol Team: Matrix CMPE-208 Fall 2006.
1 Introduction to Internet Network Management Mi-Jung Choi Dept. of Computer Science KNU
Network Management8-1 Chapter 8: Network Management Chapter goals: r introduction to network management m motivation m major components r Internet network.
1 © 1999 BMC SOFTWARE, INC. 2/10/00 SNMP Simple Network Management Protocol.
ECE Prof. John A. Copeland Office: Klaus or call.
SNMP ITL. ITL: © Hans Kruse, Shawn Ostermann, Carl Bruggeman2 Objectives Overview of SNMP SNMP Tools SNMP Monitoring Infrastructure.
Communication and Functional Models
BAI513 - PROTOCOLS SNMP BAIST – Network Management.
Slide 1 Replacing TripWire with SNMPv3 Matthew G. Marsh Chief Scientist of the NEbraskaCERT.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Slide 1 SNMPv3, SSH & Cisco Matthew G. Marsh Chief Scientist of the NEbraskaCERT.
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
Internet Standard Management Framework
Do We Need a New Network Management Framework? David Harrington IETF66 OPS Area Meeting Montreal, Quebec, Canada.
SNMPv3 1.DESIGN REQUIREMENTS 2.BIRTH & FEATURES of SNMPv3 3.ARCHITECTURE 4.SECURE COMMUNICATION - USER SECURITY MODEL (USM) 5. ACCESS CONTROL - VIEW BASED.
APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008 Introduction to SNMP.
Management Information Base for Version 2 of the Simple Network Management Protocol (MIB for SNMPv2)
Network Management Security
Ch 9. Network Management Myungchul Kim
 Introduction  Structure of Management Information  Practical Issues  Summary 2.
Text Overview of SNMP, FTP, Telnet. Text Overview of SNMP.
Topic 11 Network Management. SNMPv1 This information is specific to SNMPv1. When using SNMPv1, the snmpd agent uses a simple authentication scheme to.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ITL Getting Information: Packet Sniffing Cisco Router Commands SNMP.
Network Management Workshop June 2009 Papeete, French Polynesia
Network Management Security in distributed and remote network management protocols.
SNMP (Simple Network Management Protocol) Overview
Simple Network Management Protocol
or call for office visit, or call Kathy Cheek,
APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008
SNMP M Clements ENS.
Network Management Workshop November 2009 Nadi, Fiji
SNMP M Clements ENS.
Network Management Workshop June 2009 Papeete, French Polynesia
SNMP (Simple Network Management Protocol) Overview
Introduction to Internet Network Management
System and Network Management
SNMP M Clements ENS.
Network Management Workshop intERlab at AIT Thailand March 11-15, 2008
SNMP (Simple Network Management Protocol) based Network Management
COMS/CSEE 4140 Networking Laboratory Lecture 10
Chapter 5 SNMP Management
Chapter 5 SNMP Management
Simple Network Management Protocol
Presentation transcript:

Slide 1 Replacing TripWire with SNMPv3 Matthew G. Marsh Chief Scientist of the NEbraskaCERT

Slide 2 Scope Quick Overview & History of SNMP Definitions & Terminology SNMPv3 will be implicit in the rest of the sections RFC(s) that define v3 Highlights - why use v3 Authentication Privacy Security Scope General Usage Net-SNMP PakDefConX MIB PakDefConX Source Code Usage Example Discussion

Slide 3 History SNMP is defined by four features: A data definition language Management Information definition A protocol definition Security and Administration definition Standard 15 defines the protocol (SNMP) Standard 16 defines the structure of management information Standard 17 defines MIB-II All SNMP information and organization is specified using Abstract Syntax Notation One (ASN.1) (ISO Standard) SNMPv1 came into being and use in the late 1980's. By 1990 most equipment capable of speaking TCP/IP used SNMPv1 for management capabilities. Some vendors, most notably WellFleet, used SNMP as the basis for all interaction with the equipment. SNMPv1 was defined by three modes of operation Read - a mode of obtaining information from a device based on a query/response Write - a mode of setting parameters within a device based on query/response Trap - a mode for a device to send information about itself without a query These first two modes used basic single passwords as the authentication and security measures SNMPv1 was designed for and used UDP as the main transport mode Contrary to popular belief v1 did provide a framework for authentication, privacy, and authorization; however there were no actual protocol structures, designs, or implementations done within this framework. SNMPv2 came in several incarnations as it was developed. One of the primary original design goals for v2 was to structure and design authentication, privacy, and authorization. However this was not realized although much of the structure formality was completed. SNMPv2 added better data types and efficiency along with the first use of TCP for data transport confirmation SNMPv2 essentially came in three major flavours: v2c, v2u, v2*(v2p) V2c was "officially endorsed" but v2u/v2p had security structures (authentication, privacy, authorization)

Slide 4 Definitions and Terminology Abstract Syntax Notation One (ASN.1) (ISO Standard) =.iso.org.dod.internet This is the tree from whence all MIB things come... ;-} OID - Object ID is the reference to the ASN.1 code which defines an object is the OID assigned to Paktronix Systems LLC Paktronix Systems MIBs would begin from this OID and branch outward and downward is the settable string of the file to be hashed and is fully decoded as:.iso.org.dod.internet.private.enterprises.Paktronix.PakDC.PakSETFiles.PakTestFileString Structure of Management Information - SMI defines the structure of the data (data definition language) SMIv1 is the format used in SNMPv1/v2 SMIv2 is the new extended improved format Community - the password used in v1 and v2c Read was by popular default = public Write was by popular default = private Agent - the device about which information is desired Hub, router, coffee machine ^H^H Java Dispenser... Manager - the device which "manages" an agent NetView, OpenView, Tivoli, Unicenter, etal are Managers Managers typically query many remote agents but in some cases you can have a device that is both manager and agent in one. MIB - Management Information Base Think of a database tree with all of the relevant information for a particular device Generic MIB is called MIB-II (as opposed to MIB-I...) and is defined in RFC 1213 Authentication - proving you are who you say you are (password/community/...) Privacy - encryption of the data in transport Authorization - Access Control applied to MIBs Authorization is typically done by specifying subsets or even individual OIDs Trap - an Agent initiated data transfer

Slide 5 RFC Documents SNMP Version 3 is the current version of the Simple Network Management Protocol. This version was ratified as a Draft Standard in March of RFC 2570: Introduction to Version 3 of the Internet-standard Network Management Framework, Informational, April 1999 RFC 2571: An Architecture for Describing SNMP Management Frameworks, Draft Standard, April 1999 RFC 2572: Message Processing and Dispatching for the Simple Network Management Protocol (SNMP), Draft Standard, April 1999 RFC 2573: SNMP Applications, Draft Standard, April 1999 RFC 2574: User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3), Draft Standard, April 1999 RFC 2575: View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP), Draft Standard, April 1999 RFC 2576: Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard Network Management Framework, Proposed Standard, March 2000 These documents reuse definitions from the following SNMPv2 specifications: RFC 1905: Protocol Operations for Version 2 of the Simple Network Management Protocol (SNMPv2), Draft Standard RFC 1906: Transport Mappings for Version 2 of the Simple Network Management Protocol (SNMPv2), Draft Standard RFC 1907: Management Information Base for Version 2 of the Simple Network Management Protocol (SNMPv2), Draft Standard

Slide 6 SNMPv3 Highlights Authentication MD5 or SHA authentication passphrase hashes Passphrase must be greater than 8 characters including spaces Privacy Packet data may now be DES encrypted (future use allows additional encryptions) Passphrase defaults to authentication passphrase Allows for unique Privacy passphrase Inform Traps Old style trap was "throw-n-pray" over UDP v2 Inform trap is over TCP and requires a response Traps may also have Authentication and Privacy passphrases Security Structures User / Scope / ACL all may have independent AuthPriv structures SNMP Version 3 - Important Points

Slide 7 Authentication User Defines the unit of access Group Defines class for application of scope View Defines a set of resources within a MIB structure Operation Defines the actions that may be performed READ WRITE ADMINISTER Operations are applied to Views Users are assigned to Groups Groups are assigned Views SNMP Version 3 - Authentication

Slide 8 Privacy SNMP v1 and v2c transported data in clear text v3 allows the data payload to be encrypted Currently the specification only allows for DES May be overridden for custom applications Specification allows for multiple encryption mechanisms to be defined Passphrase defaults to using the authentication passphrase Passphrase may be completely separate and unique Privacy must be specified in conjunction with authentication Allowed: NONE, authnoPriv, authPriv SNMP Version 3 - Privacy

Slide 9 Security Structures Passphrases are applied to User object only in current specification Thus divorcing the ACL applied to the User from the AuthPriv functions Each User object may have unique passphrases Specification extensions are being considered to allow Passphrases for Groups Passphrases for Views Multiple Passphrases per User Per Operation Mode Typically there is one User defined per Operation Mode SNMP Version 3 - Security Structures

Slide 10 Misc Implementation Notes Implementation is requestor/provider model On Provider Services through daemon process Concept of "Engine ID" Core of authPriv passphrases security First pass hash mechanisms for storage On Requestor Services through query of Provider "Engine ID" also important Engine ID provides significant security addition through first pass hash SNMP Version 3 - Misc

Slide 11 General Usage Notes Use multiple Users One for each action (get, set, trap) Different Authentication passphrases Always use Privacy - authPriv Make sure the passphrases are different from the User's For custom applications consider defining and using your own authentication and privacy encryption methods PakSecured extensions use mhash libraries thus allowing use of any of the mechanisms they contain (see sourcecode) Easily extensible to use mcrypt (or libraries of choice) Always set up your initial security in a secure environment before exposing the system to the elements. SUMMARY: SNMP is a Message Passing Protocol.

Slide 12 Net-SNMP Net-SNMP has had v3 since _the_ reference application for SNMP Originally based on the Carnegie Mellon University and University of California at Davis SNMP implementations. Includes various tools relating to SNMP including: An extensible agent An SNMP library Tools to request or set information from SNMP agents Tools to generate and handle SNMP traps Can use multiple transports IPv4 UDP/TCP IPv6 UDP/TCP IPX on Linux !!!

Slide 13 PakDefConX MIB PakDefConX::= { enterprises 9248 } PakDCOBJECT IDENTIFIER ::= { PakDefConX 1 } -- The OBJECT IDENTIFIER for all PakDefConX tricks PakSETFiles OBJECT IDENTIFIER ::= { PakDC 1 } PakTestFileString OBJECT-TYPE SYNTAXOCTET STRING (SIZE( )) MAX-ACCESSread-write STATUScurrent DESCRIPTION "A publicly settable string that can be set for testing snmpsets. This value will eventually be used as the file name for the PakHash function. ::= { PakSETFiles 1 } PakTestFileHash OBJECT-TYPE SYNTAXString MAX-ACCESSread-only STATUScurrent DESCRIPTION "This object returns the md5sum of the file name set into PakFileTestString. Only the md5sum is returned." ::= { PakSETFiles 2 }

Slide 14 PakDefConX Source Code Source is provided as a patch against Net-SNMP v5.x Tested on all versions up to pre1 as of 7/8/2002 Get Net-SNMP version 5 - CVS usually works best. Apply the patch (patch -p1 < {patch file location} Edit the PakConfigure file in the source root dir Run the PakConfigure file (bash PakConfigure) make; make install Play Requires that mhash library or greater be installed.

Slide 15 The Point (why you are here...) Assuming that you have the Net-SNMP patched and compiled: Install an SNMPv3 user for the daemon cat > /var/net-snmp/snmpd.conf createUser defconx MD5 defconxv3 DES defconxcrypt ^D cat > /usr/local/share/snmp/snmpd.conf rwuser defconx ^D Fire up the daemon - /usr/local/sbin/snmpd Now to play with the mib defs: snmpwalk -u defconx -l authPriv -a MD5 -A defconxv3 -x DES -X defconxcrypt localhost PAKDEFCONX-MIB::PakTestFileString.0 = STRING: "/etc/hosts" PAKDEFCONX-MIB::PakTestFileHash.0 = STRING: "5b41d38e2a46d028902e3cecf808c582" DEFINE {insert Stuff} = '-u defconx -l authPriv -a MD5 -A defconxv3 -x DES -X defconxcrypt' snmpset {insert Stuff} localhost s "/etc/services" PAKDEFCONX-MIB::PakTestFileString.0 = STRING: "/etc/services" snmpwalk {insert Stuff} localhost PAKDEFCONX-MIB::PakTestFileString.0 = STRING: "/etc/services" PAKDEFCONX-MIB::PakTestFileHash.0 = STRING: "24fd8b34bc51d3ebfab4784ca63a70e7" FV Oiler.

Slide 16 Comments, Critiques, CIA These are words that begin with a 'c'

Slide 17 Replacing TripWire with SNMPv3 Matthew G. Marsh Chief Scientist of the NEbraskaCERT