RFC 1352 (rfc1352) - Page 2 of 41
SNMP Security Protocols
Alternative Format: Original Text Document
RFC 1352 SNMP Security Protocols July 1992
7.3.3 Data Origin Authentication Mechanism . . . . . . . . . . . 36
7.3.4 Restricted Administration Mechanism . . . . . . . . . . . 36
7.3.5 Ordered Delivery Mechanism . . . . . . . . . . . . . . . 37
7.3.6 Message Timeliness Mechanism . . . . . . . . . . . . . . . 38
7.3.7 Selective Clock Acceleration Mechanism . . . . . . . . . . 38
7.3.8 Confidentiality Mechanism . . . . . . . . . . . . . . . . 39
8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 39
9. References . . . . . . . . . . . . . . . . . . . . . . . . . 40
10. Authors' Addresses . . . . . . . . . . . . . . . . . . . . . 41
1. Abstract
The Simple Network Management Protocol (SNMP) specification [1]
allows for the protection of network management operations by a
variety of security protocols. The SNMP administrative model
described in [2] provides a framework for securing SNMP network
management. In the context of that framework, this memo defines
protocols to support the following three security services:
o data integrity,
o data origin authentication, and
o data confidentiality.
Please send comments to the SNMP Security Developers mailing list
().
2. Introduction
In the model described in [2], each SNMP party is, by definition,
associated with a single authentication protocol. The authentication
protocol provides a mechanism by which SNMP management communications
transmitted by the party may be reliably identified as having
originated from that party. The authentication protocol defined in
this memo also reliably determines that the message received is the
message that was sent.
Similarly, each SNMP party is, by definition, associated with a
single privacy protocol. The privacy protocol provides a mechanism by
which SNMP management communications transmitted to said party are
protected from disclosure. The privacy protocol in this memo
specifies that only authenticated messages may be protected from
disclosure.
These protocols are secure alternatives to the so-called "trivial"
protocol defined in [1].
Galvin, McCloghrie, & Davin