WG Review: Integrated Security Model for SNMP (isms)
The IESG <iesg-secretary@ietf.org> Wed, 08 September 2004 15:20 UTC
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA19862; Wed, 8 Sep 2004 11:20:21 -0400 (EDT)
Received: from megatron.ietf.org ([132.151.6.71]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1C54Iu-0002ai-4V; Wed, 08 Sep 2004 11:24:12 -0400
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1C544Z-0001aV-NX; Wed, 08 Sep 2004 11:09:23 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1C53x3-00089C-KG; Wed, 08 Sep 2004 11:01:37 -0400
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA18417; Wed, 8 Sep 2004 11:01:35 -0400 (EDT)
Message-Id: <200409081501.LAA18417@ietf.org>
From: The IESG <iesg-secretary@ietf.org>
To: IETF-announce@ietf.org
Date: Wed, 08 Sep 2004 11:01:34 -0400
Cc: isms@ietf.org
Subject: WG Review: Integrated Security Model for SNMP (isms)
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: iesg@ietf.org
List-Id: ietf-announce.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
Sender: ietf-announce-bounces@ietf.org
Errors-To: ietf-announce-bounces@ietf.org
X-Spam-Score: 0.0 (/)
X-Scan-Signature: d185fa790257f526fedfd5d01ed9c976
A new IETF working group has been proposed in the Security Area. The IESG has not made any determination as yet. The following description was submitted, and is provided for informational purposes only. Please send your comments to the IESG mailing list (iesg@ietf.org) by September 15. Integrated Security Model for SNMP (isms) ========================================= Current Status: Proposed Working Group Description of Working Group: Version 3 of the Simple Network Management Protocol (SNMPv3) was elevated to Internet Standard in late 2002 and added security to the previous versions of the protocol. Although the enhanced protocol is secure, operators and administrators find that deploying it can be problematic in large distributions. This is due primarily to two synchronization problems. The first is the addition of yet another authentication system specific to SNMPv3 that needs to be maintained across all networking devices. Most of these devices already contain local accounts and/or the ability to negotiate with authentication servers (e.g. RADIUS servers). However, SNMPv3 does not make use of these authentication mechanisms, and this causes additional synchronization burdens. The second issue found with deploying SNMPv3 is that distributing and maintaining View-based Access Control Model (VACM) rules is also difficult in large-scale environments. The ISMS working group will focus on finding and identifying a solution for the first of the two above mentioned problems: creating a security model for SNMPv3 that will meet the security and operational needs of network administrators. The solution should maximize useability in operational environments to achieve high deployment success and at the same time minimize implementation and deployment costs to minimize the time until deployment is possible. The work will include the ability to make use of existing and commonly deployed security infrastructure. The following security infrastructures will be considered by the working group as potential existing authentication infrastructures to make use of within the new security model. The solution will hopefully be able to be integrated with multiple of these user databases although it is expected that one will be mandatory. - Local accounts - SSH identities - Radius - TACACS+ - X.509 Certificates - Kerberos - LDAP - Diameter A solution must not modify the other aspects of SNMPv3 protocol as defined in STD 62 (EG, it must not create new PDU types). It should also be compliant with the security model architectural block of SNMPv3, as outlined in RFC 3411. And if at all possible, it should also not change any other protocols either. The working group will begin focusing on initial proposals, which must be submitted for consideration by the Internet-Draft cut-off date for the 61st IETF (Oct 19th, 2004). Documents submitted for consideration need not be well-polished but are expected to adequately describe the proposed model enough that working group participants can adequately understand them to make an informed decision when considering it along with the other candidates. The working group will select one forward path from all the proposals submitted by the cut-off date. If no such selection is made by the end of March, 2004 then the working group will be closed down. Work Items - Choose a technical direction for the working group to focus on. _______________________________________________ IETF-Announce mailing list IETF-Announce@ietf.org https://www1.ietf.org/mailman/listinfo/ietf-announce