----- Original Message -----
From: "Fangliang (Leon, ICSL)" <[email protected]>
To: "t.petch" <[email protected]>; <[email protected]>
Cc: <[email protected]>; "Hedanping
(Ana)" <[email protected]>
Sent: Friday, January 23, 2015 7:26 AM

> Hi Tom and all,
>
> Network management protocol is usually attackers' target. Once
attacked, the service will be tampered and result in significant
security issue. As SNMP is the widely used management protocol for
network device and a large proportion of network devices support SNMP,
the security of SNMP is especially important. As a result we (IETF)
should pay more attention to SNMP security issues.
>
> The security expert as Stuart McClure have mentioned SNMP in his
famous book as "HACKING EXPOSED 7: NETWORK SECURITY SECRETS &
SOLUTIONS", McGraw-Hill Education, 2012, pp 348: Conceived as a network
management and monitoring service, the Simple Network Management
Protocol (SNMP) is designed to provide intimate information about
network devices, software, and systems. As such, it is a frequent target
of attackers. In addition, its general lack of strong security
protections has garnered it the colloquial name “Security Not My
Problem.”
>
> The current Key Localization Algorithm have obvious vulnerability. We
never see such cryptographic algorithm defect in other widely used
protocol. Hacker communities have mentioned the current key localization
method as a loophole, and plan to exploit the vulnerability or publish
it to CVE.
>
> To add an extra password processing module for SNMPV3, it need add
more restricted condition than the regular way. We have discussed it
with design teams, nobody accept this design proposal, for it will
induce more interoperability problems for other password based module.
Besides, this is a collision problem in key localization in SNMP, it is
not suitable to demand the developer to change the general module to fix
this special problem in SNMP.
>
> In consideration of other architectural vulnerability, this
vulnerability can be easily fixed by little revision as proposed by this
draft . Any comments?

I think the same comment as last time, that the improvement in security
is slight and the cost of doing so significant.  And better alternatives
are available (e.g. SNMP over TLS, Netconf).

Tom Petch

>
>
> Regards,
> Fang Liang
>
>
>
> -----邮件原件-----
> 发件人: t.petch [mailto:[email protected]]
> 发送时间: 2014年12月1日 18:31
> 收件人: Zhangdacheng (Dacheng); Hedanping (Ana); [email protected]
> 抄送: [email protected]
>
> ----- Original Message -----
> From: "Zhangdacheng (Dacheng)" <[email protected]>
> To: "Hedanping (Ana)" <[email protected]>; <[email protected]>
> Cc: <[email protected]>
> Sent: Saturday, November 29, 2014 3:59 AM
>
> > Let me help clarify Danping's point.
> >
> > We found there was a problem in the localization algorithm, but we
are
> not sure whether this issue is worthwhile for us to address, or the
effort of addressing this issue is out of scope of the SNMP
specification. So, we raise this question here, and hope to get comments
or suggestions.
>
> The new algorithm that you propose seems to offer very little
improvement.  You suggest that after replicating the password, you then
add the password length in the last four octets to bring the length up
to 64 octet.  This seems to add very little entropy.
>
> Also, an 8 character string, containing upper case, lower case, digit
and extended punctuation would have been regarded as too weak many years
ago and we should not be documenting such an approach now.
>
> Again, anyone who uses a password based system and does not have a
extra module to ensure that passwords meet current standards deserves
all the security breaches they get!
>
> Tom Petch
>
> >
> > Cheers
> >
> > Dacheng
> >
> > > -----Original Message-----
> > > From: OPSAWG [mailto:[email protected]] On Behalf Of
Hedanping
> > > (Ana)
> > > Sent: Saturday, November 29, 2014 10:52 AM
> > > To: [email protected]
> > > Cc: [email protected]
> > > Subject: [OPSAWG] FW: New Version Notification for
> > > draft-du-opsawg-snmp-key-localization-00.txt
> > >
> > > Dear all,
> > > We find a security problem in the current SNMP key localization
> algorithm, but
> > > we are not sure whether IETF is the right place to improve it. The
> draft is
> > > submitted and comments are appreciated.
> > >
> > > A new version of I-D, draft-du-opsawg-snmp-key-localization-00.txt
> > > has been successfully submitted by Danping He and posted to the
IETF
> > > repository.
> > >
> > > Name: draft-du-opsawg-snmp-key-localization
> > > Revision: 00
> > > Title: A New Algorithm for SNMP Key Localization Document date:
> > > 2014-11-28
> > > Group: Individual Submission
> > > Pages: 4
> > > URL:
> > >
>
http://www.ietf.org/internet-drafts/draft-du-opsawg-snmp-key-localizatio
> n-00.
> > > txt
> > > Status:
> > >
>
https://datatracker.ietf.org/doc/draft-du-opsawg-snmp-key-localization/
> > > Htmlized:
> > >
http://tools.ietf.org/html/draft-du-opsawg-snmp-key-localization-00
> > >
> > > Abstract:
> > >    This draft discusses a security issue with the algorithm for
> > >    generating SNMP localized keys and introduce a new algorithm to
> > >    address this problem.
> > >
> > > Regards,
> > > Ana (Danping)
>

_______________________________________________
OPSAWG mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsawg

Reply via email to