U2.6 SNMPv3

Description

Masters Degree Network Security Mind Map on U2.6 SNMPv3, created by Craig Parker on 21/04/2014.
Craig Parker
Mind Map by Craig Parker, updated more than 1 year ago More Less
jjanesko
Created by jjanesko about 10 years ago
Craig Parker
Copied by Craig Parker about 10 years ago
23
0

Resource summary

U2.6 SNMPv3
  1. Designed to take care of threats from SNMPv1 and SNMPv2
    1. data modification
      1. masquerade
        1. massage stream modification
          1. reorder
            1. replay
              1. delay
              2. eavesdropping
              3. adopted security services
                1. data integrity + origin authentication
                  1. Uses HMAC
                    1. HMAC generates a cryptographic fingerprint of the message to be protected and that fingerprint is sent with the message
                    2. shared key (K2) derived from snmpEngineID of authoritative entity + network admin passphrase
                      1. protects against data modification
                        1. protects against message stream modification (reorder)
                        2. data confidentiality
                          1. DES in cipher block chaining
                            1. shared key (K1) derived from snmpEngineID of authoritative entity + network admin passphrase
                              1. protects against eavesdropping
                                1. Both entities must know keys to encrypt / decrypt
                                  1. Encryption must be used with HMAC othewise an attacker could alter the encryptes PDU
                                2. message timelines (limited replay protection)
                                  1. protects against message message recording and replay
                                    1. each entity needs a clock to achieve this
                                      1. 150 second window for communication exchanges
                                        1. When sending a Get PDU the reciever is authoritive so the sender must fiirst retrieve the time , confirm the value and mainatain synchronised clocks
                                          1. Console usually sends and receives all requests where most devices only receive requests so console usually maintains the clocks
                                    2. general setup
                                      1. each NW manager now has unique username
                                        1. Each entity has a unique username in NW
                                          1. cryptography is used to enable NW devices to authenticate each other and provide confidentiality for SNMP PDU's
                                            1. introduced the idea of "authoritative entitys"
                                              1. When sending GET, SET SNMP PDU
                                                1. receiver is authoritative entity
                                                2. When sending TRAP, REPORT, RESPONSE SNMP PDU
                                                  1. sender is the authoritative entity
                                                  2. AE is the entity who's crypto keys are used to provide authenticity and confidentiality for a PDU and who's timeliness indicators will be used to prove that message is fresh
                                                3. Security Management tasks introduced with V3
                                                  1. Creation and storage of keys
                                                    1. Non- authoritive devices must manage synchronised clocks
                                                      1. Storage of user info and passwords
                                                      Show full summary Hide full summary

                                                      Similar

                                                      CCNA Security 210-260 IINS - Exam 1
                                                      Mike M
                                                      CCNA Security 210-260 IINS - Exam 2
                                                      Mike M
                                                      SY0-401 Part 1 (50 questions)
                                                      desideri
                                                      CCNA Security 210-260 IINS - Exam 1
                                                      Ricardo Nuñez
                                                      CCNA Security 210-260 IINS - Exam 3
                                                      irvin pastora
                                                      1.3 Network and Security Components
                                                      DJ Perrone
                                                      U1. OSI 7 Layer Reference Model
                                                      Craig Parker
                                                      Types of Attacks
                                                      River L.
                                                      CCNA Security 210-260 IINS - Exam 1
                                                      irvin pastora
                                                      Network Security Vocabulary
                                                      Shantal K Green
                                                      CCNA Security 210-260 IINS - Exam 2
                                                      irvin pastora