Network Working Group                                J. Galvin
         Request for Comments: 1446         Trusted Information Systems
                                                          K. McCloghrie
                                                     Hughes LAN Systems
                                                             April 1993


                               Security Protocols
                              for version 2 of the
                  Simple Network Management Protocol (SNMPv2)


         Status of this Memo

         This RFC specifes an IAB standards track protocol for the
         Internet community, and requests discussion and suggestions
         for improvements.  Please refer to the current edition of the
         "IAB Official Protocol Standards" for the standardization
         state and status of this protocol.  Distribution of this memo
         is unlimited.


         Table of Contents


         1 Introduction ..........................................    2
         1.1 A Note on Terminology ...............................    3
         1.2 Threats .............................................    4
         1.3 Goals and Constraints ...............................    5
         1.4 Security Services ...................................    6
         1.5 Mechanisms ..........................................    7
         1.5.1 Message Digest Algorithm ..........................    8
         1.5.2 Symmetric Encryption Algorithm ....................    9
         2 SNMPv2 Party ..........................................   11
         3 Digest Authentication Protocol ........................   14
         3.1 Generating a Message ................................   16
         3.2 Receiving a Message .................................   18
         4 Symmetric Privacy Protocol ............................   21
         4.1 Generating a Message ................................   21
         4.2 Receiving a Message .................................   22
         5 Clock and Secret Distribution .........................   24
         5.1 Initial Configuration ...............................   25
         5.2 Clock Distribution ..................................   28
         5.3 Clock Synchronization ...............................   29
         5.4 Secret Distribution .................................   31
         5.5 Crash Recovery ......................................   34
         6 Security Considerations ...............................   37
         6.1 Recommended Practices ...............................   37
         6.2 Conformance .........................................   39
         6.3 Protocol Correctness ................................   42




         Galvin & McCloghrie                                   [Page i]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         6.3.1 Clock Monotonicity Mechanism ......................   43
         6.3.2 Data Integrity Mechanism ..........................   43
         6.3.3 Data Origin Authentication Mechanism ..............   44
         6.3.4 Restricted Administration Mechanism ...............   44
         6.3.5 Message Timeliness Mechanism ......................   45
         6.3.6 Selective Clock Acceleration Mechanism ............   46
         6.3.7 Confidentiality Mechanism .........................   47
         7 Acknowledgements ......................................   48
         8 References ............................................   49
         9 Authors' Addresses ....................................   51








































         Galvin & McCloghrie                                   [Page 1]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         1.  Introduction

         A network management system contains: several (potentially
         many) nodes, each with a processing entity, termed an agent,
         which has access to management instrumentation; at least one
         management station; and, a management protocol, used to convey
         management information between the agents and management
         stations.  Operations of the protocol are carried out under an
         administrative framework which defines both authentication and
         authorization policies.

         Network management stations execute management applications
         which monitor and control network elements.  Network elements
         are devices such as hosts, routers, terminal servers, etc.,
         which are monitored and controlled through access to their
         management information.

         In the Administrative Model for SNMPv2 document [1], each
         SNMPv2 party is, by definition, associated with a single
         authentication protocol and a single privacy protocol.  It is
         the purpose of this document, Security Protocols for SNMPv2,
         to define one such authentication and one such privacy
         protocol.

         The authentication protocol provides a mechanism by which
         SNMPv2 management communications transmitted by the party may
         be reliably identified as having originated from that party.
         The authentication protocol defined in this memo also reliably
         determines that the message received is the message that was
         sent.

         The privacy protocol provides a mechanism by which SNMPv2
         management communications transmitted to said party are
         protected from disclosure.  The privacy protocol in this memo
         specifies that only authenticated messages may be protected
         from disclosure.

         These protocols are secure alternatives to the so-called
         "trivial" protocol defined in [2].

              USE OF THE TRIVIAL PROTOCOL ALONE DOES NOT CONSTITUTE
              SECURE NETWORK MANAGEMENT.  THEREFORE, A NETWORK
              MANAGEMENT SYSTEM THAT IMPLEMENTS ONLY THE TRIVIAL
              PROTOCOL IS NOT CONFORMANT TO THIS SPECIFICATION.






         Galvin & McCloghrie                                   [Page 2]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         The Digest Authentication Protocol is described in Section 3.
         It provides a data integrity service by transmitting a message
         digest - computed by the originator and verified by the
         recipient - with each SNMPv2 message.  The data origin
         authentication service is provided by prefixing the message
         with a secret value known only to the originator and
         recipient, prior to computing the digest.  Thus, data
         integrity is supported explicitly while data origin
         authentication is supported implicitly in the verification of
         the digest.

         The Symmetric Privacy Protocol is described in Section 4.  It
         protects messages from disclosure by encrypting their contents
         according to a secret cryptographic key known only to the
         originator and recipient.  The additional functionality
         afforded by this protocol is assumed to justify its additional
         computational cost.

         The Digest Authentication Protocol depends on the existence of
         loosely synchronized clocks between the originator and
         recipient of a message.  The protocol specification makes no
         assumptions about the strategy by which such clocks are
         synchronized.  Section 5.3 presents one strategy that is
         particularly suited to the demands of SNMP network management.

         Both protocols described here require the sharing of secret
         information between the originator of a message and its
         recipient.  The protocol specifications assume the existence
         of the necessary secrets.  The selection of such secrets and
         their secure distribution to appropriate parties may be
         accomplished by a variety of strategies.  Section 5.4 presents
         one such strategy that is particularly suited to the demands
         of SNMP network management.


         1.1.  A Note on Terminology

         For the purpose of exposition, the original Internet-standard
         Network Management Framework, as described in RFCs 1155, 1157,
         and 1212, is termed the SNMP version 1 framework (SNMPv1).
         The current framework is termed the SNMP version 2 framework
         (SNMPv2).








         Galvin & McCloghrie                                   [Page 3]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         1.2.  Threats

         Several of the classical threats to network protocols are
         applicable to the network management problem and therefore
         would be applicable to any SNMPv2 security protocol.  Other
         threats are not applicable to the network management problem.
         This section discusses principal threats, secondary threats,
         and threats which are of lesser importance.

         The principal threats against which any SNMPv2 security
         protocol should provide protection are:


         Modification of Information
              The SNMPv2 protocol provides the means for management
              stations to interrogate and to manipulate the value of
              objects in a managed agent.  The modification threat is
              the danger that some party may alter in-transit messages
              generated by an authorized party in such a way as to
              effect unauthorized management operations, including
              falsifying the value of an object.

         Masquerade
              The SNMPv2 administrative model includes an access
              control model.  Access control necessarily depends on
              knowledge of the origin of a message.  The masquerade
              threat is the danger that management operations not
              authorized for some party may be attempted by that party
              by assuming the identity of another party that has the
              appropriate authorizations.

         Two secondary threats are also identified.  The security
         protocols defined in this memo do provide protection against:

         Message Stream Modification
              The SNMPv2 protocol is based upon a connectionless
              transport service which may operate over any subnetwork
              service.  The re-ordering, delay or replay of messages
              can and does occur through the natural operation of many
              such subnetwork services.  The message stream
              modification threat is the danger that messages may be
              maliciously re-ordered, delayed or replayed to an extent
              which is greater than can occur through the natural
              operation of a subnetwork service, in order to effect
              unauthorized management operations.





         Galvin & McCloghrie                                   [Page 4]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         Disclosure
              The disclosure threat is the danger of eavesdropping on
              the exchanges between managed agents and a management
              station.  Protecting against this threat is mandatory
              when the SNMPv2 is used to create new SNMPv2 parties [1]
              on which subsequent secure operation might be based.
              Protecting against the disclosure threat may also be
              required as a matter of local policy.

         There are at least two threats that a SNMPv2 security protocol
         need not protect against.  The security protocols defined in
         this memo do not provide protection against:

         Denial of Service
              A SNMPv2 security protocol need not attempt to address
              the broad range of attacks by which service to authorized
              parties is denied.  Indeed, such denial-of-service
              attacks are in many cases indistinguishable from the type
              of network failures with which any viable network
              management protocol must cope as a matter of course.

         Traffic Analysis
              In addition, a SNMPv2 security protocol need not attempt
              to address traffic analysis attacks.  Indeed, many
              traffic patterns are predictable - agents may be managed
              on a regular basis by a relatively small number of
              management stations - and therefore there is no
              significant advantage afforded by protecting against
              traffic analysis.


         1.3.  Goals and Constraints

         Based on the foregoing account of threats in the SNMP network
         management environment, the goals of a SNMPv2 security
         protocol are enumerated below.

         (1)  The protocol should provide for verification that each
              received SNMPv2 message has not been modified during its
              transmission through the network in such a way that an
              unauthorized management operation might result.

         (2)  The protocol should provide for verification of the
              identity of the originator of each received SNMPv2
              message.





         Galvin & McCloghrie                                   [Page 5]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         (3)  The protocol should provide that the apparent time of
              generation for each received SNMPv2 message is recent.

         (4)  The protocol should provide, when necessary, that the
              contents of each received SNMPv2 message are protected
              from disclosure.

         In addition to the principal goal of supporting secure network
         management, the design of any SNMPv2 security protocol is also
         influenced by the following constraints:

         (1)  When the requirements of effective management in times of
              network stress are inconsistent with those of security,
              the former are preferred.

         (2)  Neither the security protocol nor its underlying security
              mechanisms should depend upon the ready availability of
              other network services (e.g., Network Time Protocol (NTP)
              or secret/key management protocols).

         (3)  A security mechanism should entail no changes to the
              basic SNMP network management philosophy.


         1.4.  Security Services

         The security services necessary to support the goals of a
         SNMPv2 security protocol are as follows.

         Data Integrity
              is the provision of the property that data has not been
              altered or destroyed in an unauthorized manner, nor have
              data sequences been altered to an extent greater than can
              occur non-maliciously.

         Data Origin Authentication
              is the provision of the property that the claimed origin
              of received data is corroborated.

         Data Confidentiality
              is the provision of the property that information is not
              made available or disclosed to unauthorized individuals,
              entities, or processes.







         Galvin & McCloghrie                                   [Page 6]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         The protocols specified in this memo require both data
         integrity and data origin authentication to be used at all
         times.  For these protocols, it is not possible to realize
         data integrity without data origin authentication, nor is it
         possible to realize data origin authentication without data
         integrity.

         Further, there is no provision for data confidentiality
         without both data integrity and data origin authentication.


         1.5.  Mechanisms

         The security protocols defined in this memo employ several
         types of mechanisms in order to realize the goals and security
         services described above:

         o    In support of data integrity, a message digest algorithm
              is required.  A digest is calculated over an appropriate
              portion of a SNMPv2 message and included as part of the
              message sent to the recipient.

         o    In support of data origin authentication and data
              integrity, the portion of a SNMPv2 message that is
              digested is first prefixed with a secret value shared by
              the originator of that message and its intended
              recipient.

         o    To protect against the threat of message delay or replay,
              (to an extent greater than can occur through normal
              operation), a timestamp value is included in each message
              generated.  A recipient evaluates the timestamp to
              determine if the message is recent.  This protection
              against the threat of message delay or replay does not
              imply nor provide any protection against unauthorized
              deletion or suppression of messages.  Other mechanisms
              defined independently of the security protocol can also
              be used to detect message replay (e.g., the request-id
              [2]), or for set operations, the re-ordering, replay,
              deletion, or suppression of messages (e.g., the MIB
              variable snmpSetSerialNo [14]).

         o    In support of data confidentiality, a symmetric
              encryption algorithm is required.  An appropriate portion
              of the message is encrypted prior to being transmitted to





         Galvin & McCloghrie                                   [Page 7]





         RFC 1446        Security Protocols for SNMPv2       April 1993


              its recipient.

         The security protocols in this memo are defined independently
         of the particular choice of a message digest and encryption
         algorithm - owing principally to the lack of a suitable metric
         by which to evaluate the security of particular algorithm
         choices.  However, in the interests of completeness and in
         order to guarantee interoperability, Sections 1.5.1 and 1.5.2
         specify particular choices, which are considered acceptably
         secure as of this writing.  In the future, this memo may be
         updated by the publication of a memo specifying substitute or
         alternate choices of algorithms, i.e., a replacement for or
         addition to the sections below.


         1.5.1.  Message Digest Algorithm

         In support of data integrity, the use of the MD5 [3] message
         digest algorithm is chosen.  A 128-bit digest is calculated
         over the designated portion of a SNMPv2 message and included
         as part of the message sent to the recipient.

         An appendix of [3] contains a C Programming Language
         implementation of the algorithm.  This code was written with
         portability being the principal objective.  Implementors may
         wish to optimize the implementation with respect to the
         characteristics of their hardware and software platforms.

         The use of this algorithm in conjunction with the Digest
         Authentication Protocol (see Section 3) is identified by the
         ASN.1 object identifier value v2md5AuthProtocol, defined in
         [4].  (Note that this protocol is a modified version of the
         md5AuthProtocol protocol defined in RFC 1352.)

         For any SNMPv2 party for which the authentication protocol is
         v2md5AuthProtocol, the size of its private authentication key
         is 16 octets.

         Within an authenticated management communication generated by
         such a party, the size of the authDigest component of that
         communication (see Section 3) is 16 octets.









         Galvin & McCloghrie                                   [Page 8]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         1.5.2.  Symmetric Encryption Algorithm

         In support of data confidentiality, the use of the Data
         Encryption Standard (DES) in the Cipher Block Chaining mode of
         operation is chosen.  The designated portion of a SNMPv2
         message is encrypted and included as part of the message sent
         to the recipient.

         Two organizations have published specifications defining the
         DES: the National Institute of Standards and Technology (NIST)
         [5] and the American National Standards Institute [6].  There
         is a companion Modes of Operation specification for each
         definition (see [7] and [8], respectively).

         The NIST has published three additional documents that
         implementors may find useful.

         o    There is a document with guidelines for implementing and
              using the DES, including functional specifications for
              the DES and its modes of operation [9].

         o    There is a specification of a validation test suite for
              the DES [10].  The suite is designed to test all aspects
              of the DES and is useful for pinpointing specific
              problems.

         o    There is a specification of a maintenance test for the
              DES [11].  The test utilizes a minimal amount of data and
              processing to test all components of the DES.  It
              provides a simple yes-or-no indication of correct
              operation and is useful to run as part of an
              initialization step, e.g., when a computer reboots.

         The use of this algorithm in conjunction with the Symmetric
         Privacy Protocol (see Section 4) is identified by the ASN.1
         object identifier value desPrivProtocol, defined in [4].

         For any SNMPv2 party for which the privacy protocol is
         desPrivProtocol, the size of the private privacy key is 16
         octets, of which the first 8 octets are a DES key and the
         second 8 octets are a DES Initialization Vector.  The 64-bit
         DES key in the first 8 octets of the private key is a 56 bit
         quantity used directly by the algorithm plus 8 parity bits -
         arranged so that one parity bit is the least significant bit
         of each octet.  The setting of the parity bits is ignored.





         Galvin & McCloghrie                                   [Page 9]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         The length of the octet sequence to be encrypted by the DES
         must be an integral multiple of 8.  When encrypting, the data
         should be padded at the end as necessary; the actual pad value
         is insignificant.

         If the length of the octet sequence to be decrypted is not an
         integral multiple of 8 octets, the processing of the octet
         sequence should be halted and an appropriate exception noted.
         Upon decrypting, the padding should be ignored.









































         Galvin & McCloghrie                                  [Page 10]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         2.  SNMPv2 Party

         Recall from [1] that a SNMPv2 party is a conceptual, virtual
         execution context whose operation is restricted (for security
         or other purposes) to an administratively defined subset of
         all possible operations of a particular SNMPv2 entity.  A
         SNMPv2 entity is an actual process which performs network
         management operations by generating and/or responding to
         SNMPv2 protocol messages in the manner specified in [12].
         Architecturally, every SNMPv2 entity maintains a local
         database that represents all SNMPv2 parties known to it.







































         Galvin & McCloghrie                                  [Page 11]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         A SNMPv2 party may be represented by an ASN.1 value with the
         following syntax:

              SnmpParty ::= SEQUENCE {
                partyIdentity
                   OBJECT IDENTIFIER,
                partyTDomain
                   OBJECT IDENTIFIER,
                partyTAddress
                   OCTET STRING,
                partyMaxMessageSize
                   INTEGER,
                partyAuthProtocol
                   OBJECT IDENTIFIER,
                partyAuthClock
                   INTEGER,
                partyAuthPrivate
                   OCTET STRING,
                partyAuthPublic
                   OCTET STRING,
                partyAuthLifetime
                   INTEGER,
                partyPrivProtocol
                   OBJECT IDENTIFIER,
                partyPrivPrivate
                   OCTET STRING,
                partyPrivPublic
                   OCTET STRING
              }

         For each SnmpParty value that represents a SNMPv2 party, the
         generic significance of each of its components is defined in
         [1].  For each SNMPv2 party that supports the generation of
         messages using the Digest Authentication Protocol, additional,
         special significance is attributed to certain components of
         that party's representation:

         o    Its partyAuthProtocol component is called the
              authentication protocol and identifies a combination of
              the Digest Authentication Protocol with a particular
              digest algorithm (such as that defined in Section 1.5.1).
              This combined mechanism is used to authenticate the
              origin and integrity of all messages generated by the
              party.






         Galvin & McCloghrie                                  [Page 12]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         o    Its partyAuthClock component is called the authentication
              clock and represents a notion of the current time that is
              specific to the party.

         o    Its partyAuthPrivate component is called the private
              authentication key and represents any secret value needed
              to support the Digest Authentication Protocol and
              associated digest algorithm.

         o    Its partyAuthPublic component is called the public
              authentication key and represents any public value that
              may be needed to support the authentication protocol.
              This component is not significant except as suggested in
              Section 5.4.

         o    Its partyAuthLifetime component is called the lifetime
              and represents an administrative upper bound on
              acceptable delivery delay for protocol messages generated
              by the party.

         For each SNMPv2 party that supports the receipt of messages
         via the Symmetric Privacy Protocol, additional, special
         significance is attributed to certain components of that
         party's representation:

         o    Its partyPrivProtocol component is called the privacy
              protocol and identifies a combination of the Symmetric
              Privacy Protocol with a particular encryption algorithm
              (such as that defined in Section 1.5.2).  This combined
              mechanism is used to protect from disclosure all protocol
              messages received by the party.

         o    Its partyPrivPrivate component is called the private
              privacy key and represents any secret value needed to
              support the Symmetric Privacy Protocol and associated
              encryption algorithm.

         o    Its partyPrivPublic component is called the public
              privacy key and represents any public value that may be
              needed to support the privacy protocol.  This component
              is not significant except as suggested in Section 5.4.









         Galvin & McCloghrie                                  [Page 13]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         3.  Digest Authentication Protocol

         This section describes the Digest Authentication Protocol.  It
         provides both for verifying the integrity of a received
         message (i.e., the message received is the message sent) and
         for verifying the origin of a message (i.e., the reliable
         identification of the originator).  The integrity of the
         message is protected by computing a digest over an appropriate
         portion of a message.  The digest is computed by the
         originator of the message, transmitted with the message, and
         verified by the recipient of the message.

         A secret value known only to the originator and recipient of
         the message is prefixed to the message prior to the digest
         computation.  Thus, the origin of the message is known
         implicitly with the verification of the digest.

         A requirement on parties using this Digest Authentication
         Protocol is that they shall not originate messages for
         transmission to any destination party which does not also use
         this Digest Authentication Protocol.  This restriction
         excludes undesirable side effects of communication between a
         party which uses these security protocols and a party which
         does not.

         Recall from [1] that a SNMPv2 management communication is
         represented by an ASN.1 value with the following syntax:

              SnmpMgmtCom ::= [2] IMPLICIT SEQUENCE {
                dstParty
                   OBJECT IDENTIFIER,
                srcParty
                   OBJECT IDENTIFIER,
                context
                   OBJECT IDENTIFIER,
                pdu
                   PDUs
              }

         For each SnmpMgmtCom value that represents a SNMPv2 management
         communication, the following statements are true:

         o    Its dstParty component is called the destination and
              identifies the SNMPv2 party to which the communication is
              directed.





         Galvin & McCloghrie                                  [Page 14]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         o    Its srcParty component is called the source and
              identifies the SNMPv2 party from which the communication
              is originated.

         o    Its context component identifies the SNMPv2 context
              containing the management information referenced by the
              communication.

         o    Its pdu component has the form and significance
              attributed to it in [12].

         Recall from [1] that a SNMPv2 authenticated management
         communication is represented by an ASN.1 value with the
         following syntax:

              SnmpAuthMsg ::= [1] IMPLICIT SEQUENCE {
                authInfo
                   ANY, - defined by authentication protocol
                authData
                   SnmpMgmtCom
              }

         For each SnmpAuthMsg value that represents a SNMPv2
         authenticated management communication, the following
         statements are true:

         o    Its authInfo component is called the authentication
              information and represents information required in
              support of the authentication protocol used by both the
              SNMPv2 party originating the message, and the SNMPv2
              party receiving the message.  The detailed significance
              of the authentication information is specific to the
              authentication protocol in use; it has no effect on the
              application semantics of the communication other than its
              use by the authentication protocol in determining whether
              the communication is authentic or not.

         o    Its authData component is called the authentication data












         Galvin & McCloghrie                                  [Page 15]





         RFC 1446        Security Protocols for SNMPv2       April 1993


              and represents a SNMPv2 management communication.

         In support of the Digest Authentication Protocol, an authInfo
         component is of type AuthInformation:

              AuthInformation ::= [2] IMPLICIT SEQUENCE {
                authDigest
                   OCTET STRING,
                authDstTimestamp
                   UInteger32,
                authSrcTimestamp
                   UInteger32
              }

         For each AuthInformation value that represents authentication
         information, the following statements are true:

         o    Its authDigest component is called the authentication
              digest and represents the digest computed over an
              appropriate portion of the message, where the message is
              temporarily prefixed with a secret value for the purposes
              of computing the digest.

         o    Its authSrcTimestamp component is called the
              authentication timestamp and represents the time of the
              generation of the message according to the partyAuthClock
              of the SNMPv2 party that originated it.  Note that the
              granularity of the authentication timestamp is 1 second.

         o    Its authDstTimestamp component is called the
              authentication timestamp and represents the time of the
              generation of the message according to the partyAuthClock
              of the SNMPv2 party that is to receive it.  Note that the
              granularity of the authentication timestamp is 1 second.


         3.1.  Generating a Message

         This section describes the behavior of a SNMPv2 entity when it
         acts as a SNMPv2 party for which the authentication protocol
         is administratively specified as the Digest Authentication
         Protocol.  Insofar as the behavior of a SNMPv2 entity when
         transmitting protocol messages is defined generically in [1],
         only those aspects of that behavior that are specific to the
         Digest Authentication Protocol are described below.  In





         Galvin & McCloghrie                                  [Page 16]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         particular, this section describes the encapsulation of a
         SNMPv2 management communication into a SNMPv2 authenticated
         management communication.

         According to Section 3.1 of [1], a SnmpAuthMsg value is
         constructed during Step 3 of generic processing.  In
         particular, it states the authInfo component is constructed
         according to the authentication protocol identified for the
         SNMPv2 party originating the message.  When the relevant
         authentication protocol is the Digest Authentication Protocol,
         the procedure performed by a SNMPv2 entity whenever a
         management communication is to be transmitted by a SNMPv2
         party is as follows.

         (1)  The local database is consulted to determine the
              authentication clock and private authentication key
              (extracted, for example, according to the conventions
              defined in Section 1.5.1) of the SNMPv2 party originating
              the message.  The local database is also consulted to
              determine the authentication clock of the receiving
              SNMPv2 party.

         (2)  The authSrcTimestamp component is set to the retrieved
              authentication clock value of the message's source.  The
              authDstTimestamp component is set to the retrieved
              authentication clock value of the message's intended
              recipient.

         (3)  The authentication digest is temporarily set to the
              private authentication key of the SNMPv2 party
              originating the message.  The SnmpAuthMsg value is
              serialized according to the conventions of [13] and [12].
              A digest is computed over the octet sequence representing
              that serialized value using, for example, the algorithm
              specified in Section 1.5.1.  The authDigest component is
              set to the computed digest value.

         As set forth in [1], the SnmpAuthMsg value is then
         encapsulated according to the appropriate privacy protocol
         into a SnmpPrivMsg value.  This latter value is then
         serialized and transmitted to the receiving SNMPv2 party.









         Galvin & McCloghrie                                  [Page 17]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         3.2.  Receiving a Message

         This section describes the behavior of a SNMPv2 entity upon
         receipt of a protocol message from a SNMPv2 party for which
         the authentication protocol is administratively specified as
         the Digest Authentication Protocol.  Insofar as the behavior
         of a SNMPv2 entity when receiving protocol messages is defined
         generically in [1], only those aspects of that behavior that
         are specific to the Digest Authentication Protocol are
         described below.

         According to Section 3.2 of [1], a SnmpAuthMsg value is
         evaluated during Step 9 of generic processing.  In particular,
         it states the SnmpAuthMsg value is evaluated according to the
         authentication protocol identified for the SNMPv2 party that
         originated the message.  When the relevant authentication
         protocol is the Digest Authentication Protocol, the procedure
         performed by a SNMPv2 entity whenever a management
         communication is received by a SNMPv2 party is as follows.

         (1)  If the ASN.1 type of the authInfo component is not
              AuthInformation, the message is evaluated as unauthentic,
              and the snmpStatsBadAuths counter [14] is incremented.
              Otherwise, the authSrcTimestamp, authDstTimestamp, and
              authDigest components are extracted from the SnmpAuthMsg
              value.

         (2)  The local database is consulted to determine the
              authentication clock, private authentication key
              (extracted, for example, according to the conventions
              defined in Section 1.5.1), and lifetime of the SNMPv2
              party that originated the message.

         (3)  If the authSrcTimestamp component plus the lifetime is
              less than the authentication clock, the message is
              evaluated as unauthentic, and the snmpStatsNotInLifetimes
              counter [14] is incremented.

         (4)  The authDigest component is extracted and temporarily
              recorded.

         (5)  A new SnmpAuthMsg value is constructed such that its
              authDigest component is set to the private authentication
              key and its other components are set to the value of the
              corresponding components in the received SnmpAuthMsg





         Galvin & McCloghrie                                  [Page 18]





         RFC 1446        Security Protocols for SNMPv2       April 1993


              value.  This new SnmpAuthMsg value is serialized
              according to the conventions of [13] and [12].  A digest
              is computed over the octet sequence representing that
              serialized value using, for example, the algorithm
              specified in Section 1.5.1.

                                           NOTE
                   Because serialization rules are unambiguous but may
                   not be unique, great care must be taken in
                   reconstructing the serialized value prior to
                   computing the digest.  Implementations may find it
                   useful to keep a copy of the original serialized
                   value and then simply modify the octets which
                   directly correspond to the placement of the
                   authDigest component, rather than re-applying the
                   serialization algorithm to the new SnmpAuthMsg
                   value.

         (6)  If the computed digest value is not equal to the digest
              value temporarily recorded in step 4 above, the message
              is evaluated as unauthentic, and the
              snmpStatsWrongDigestValues counter [14] is incremented.

         (7)  The message is evaluated as authentic.

         (8)  The local database is consulted for access privileges
              permitted by the local access policy to the originating
              SNMPv2 party with respect to the receiving SNMPv2 party.
              If any level of access is permitted, then:

                the authentication clock value locally recorded for the
                originating SNMPv2 party is advanced to the
                authSrcTimestamp value if this latter exceeds the
                recorded value; and,

                the authentication clock value locally recorded for the
                receiving SNMPv2 party is advanced to the
                authDstTimestamp value if this latter exceeds the
                recorded value.

             (Note that this step is conceptually independent from
             Steps 15-17 of Section 3.2 in [1]).

         If the SnmpAuthMsg value is evaluated as unauthentic, an
         authentication failure is noted and the received message is





         Galvin & McCloghrie                                  [Page 19]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         discarded without further processing.  Otherwise, processing
         of the received message continues as specified in [1].
















































         Galvin & McCloghrie                                  [Page 20]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         4.  Symmetric Privacy Protocol

         This section describes the Symmetric Privacy Protocol.  It
         provides for protection from disclosure of a received message.
         An appropriate portion of the message is encrypted according
         to a secret key known only to the originator and recipient of
         the message.

         This protocol assumes the underlying mechanism is a symmetric
         encryption algorithm.  In addition, the message to be
         encrypted must be protected according to the conventions of
         the Digest Authentication Protocol.

         Recall from [1] that a SNMPv2 private management communication
         is represented by an ASN.1 value with the following syntax:

              SnmpPrivMsg ::= [1] IMPLICIT SEQUENCE {
                privDst
                   OBJECT IDENTIFIER,
                privData
                   [1] IMPLICIT OCTET STRING
              }

         For each SnmpPrivMsg value that represents a SNMPv2 private
         management communication, the following statements are true:

         o    Its privDst component is called the privacy destination
              and identifies the SNMPv2 party to which the
              communication is directed.

         o    Its privData component is called the privacy data and
              represents the (possibly encrypted) serialization
              (according to the conventions of [13] and [12]) of a
              SNMPv2 authenticated management communication.


         4.1.  Generating a Message

         This section describes the behavior of a SNMPv2 entity when it
         communicates with a SNMPv2 party for which the privacy
         protocol is administratively specified as the Symmetric
         Privacy Protocol.  Insofar as the behavior of a SNMPv2 entity
         when transmitting a protocol message is defined generically in
         [1], only those aspects of that behavior that are specific to
         the Symmetric Privacy Protocol are described below.  In





         Galvin & McCloghrie                                  [Page 21]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         particular, this section describes the encapsulation of a
         SNMPv2 authenticated management communication into a SNMPv2
         private management communication.

         According to Section 3.1 of [1], a SnmpPrivMsg value is
         constructed during Step 5 of generic processing.  In
         particular, it states the privData component is constructed
         according to the privacy protocol identified for the SNMPv2
         party receiving the message.  When the relevant privacy
         protocol is the Symmetric Privacy Protocol, the procedure
         performed by a SNMPv2 entity whenever a management
         communication is to be transmitted by a SNMPv2 party is as
         follows.

         (1)  If the SnmpAuthMsg value is not authenticated according
              to the conventions of the Digest Authentication Protocol,
              the generation of the private management communication
              fails according to a local procedure, without further
              processing.

         (2)  The local database is consulted to determine the private
              privacy key of the SNMPv2 party receiving the message
              (represented, for example, according to the conventions
              defined in Section 1.5.2).

         (3)  The SnmpAuthMsg value is serialized according to the
              conventions of [13] and [12].

         (4)  The octet sequence representing the serialized
              SnmpAuthMsg value is encrypted using, for example, the
              algorithm specified in Section 1.5.2 and the extracted
              private privacy key.

         (5)  The privData component is set to the encrypted value.

         As set forth in [1], the SnmpPrivMsg value is then serialized
         and transmitted to the receiving SNMPv2 party.


         4.2.  Receiving a Message

         This section describes the behavior of a SNMPv2 entity when it
         acts as a SNMPv2 party for which the privacy protocol is
         administratively specified as the Symmetric Privacy Protocol.
         Insofar as the behavior of a SNMPv2 entity when receiving a





         Galvin & McCloghrie                                  [Page 22]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         protocol message is defined generically in [1], only those
         aspects of that behavior that are specific to the Symmetric
         Privacy Protocol are described below.

         According to Section 3.2 of [1], the privData component of a
         received SnmpPrivMsg value is evaluated during Step 4 of
         generic processing.  In particular, it states the privData
         component is evaluated according to the privacy protocol
         identified for the SNMPv2 party receiving the message.  When
         the relevant privacy protocol is the Symmetric Privacy
         Protocol, the procedure performed by a SNMPv2 entity whenever
         a management communication is received by a SNMPv2 party is as
         follows.

         (1)  The local database is consulted to determine the private
              privacy key of the SNMPv2 party receiving the message
              (represented, for example, according to the conventions
              defined in Section 1.5.2).

         (2)  The contents octets of the privData component are
              decrypted using, for example, the algorithm specified in
              Section 1.5.2 and the extracted private privacy key.

         Processing of the received message continues as specified in
         [1].

























         Galvin & McCloghrie                                  [Page 23]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         5.  Clock and Secret Distribution

         The protocols described in Sections 3 and 4 assume the
         existence of loosely synchronized clocks and shared secret
         values.  Three requirements constrain the strategy by which
         clock values and secrets are distributed.

         o    If the value of an authentication clock is decreased, the
              private authentication key must be changed concurrently.

              When the value of an authentication clock is decreased,
              messages that have been sent with a timestamp value
              between the value of the authentication clock and its new
              value may be replayed.  Changing the private
              authentication key obviates this threat.

         o    The private authentication key and private privacy key
              must be known only to the parties requiring knowledge of
              them.

              Protecting the secrets from disclosure is critical to the
              security of the protocols.  Knowledge of the secrets must
              be as restricted as possible within an implementation.
              In particular, although the secrets may be known to one
              or more persons during the initial configuration of a
              device, the secrets should be changed immediately after
              configuration such that their actual value is known only
              to the software.  A management station has the additional
              responsibility of recovering the state of all parties
              whenever it boots, and it may address this responsibility
              by recording the secrets on a long-term storage device.
              Access to information on this device must be as
              restricted as is practically possible.

         o    There must exist at least one SNMPv2 entity that assumes
              the role of a responsible management station.

              This management station is responsible for ensuring that
              all authentication clocks are synchronized and for
              changing the secret values when necessary.  Although more
              than one management station may share this
              responsibility, their coordination is essential to the
              secure management of the network.  The mechanism by which
              multiple management stations ensure that no more than one
              of them attempts to synchronize the clocks or update the





         Galvin & McCloghrie                                  [Page 24]





         RFC 1446        Security Protocols for SNMPv2       April 1993


              secrets at any one time is a local implementation issue.

              A responsible management station may either support clock
              synchronization and secret distribution as separate
              functions, or combine them into a single functional unit.

         The first section below specifies the procedures by which a
         SNMPv2 entity is initially configured.  The next two sections
         describe one strategy for distributing clock values and one
         for determining a synchronized clock value among SNMPv2
         parties supporting the Digest Authentication Protocol.  For
         SNMPv2 parties supporting the Symmetric Privacy Protocol, the
         next section describes a strategy for distributing secret
         values.  The last section specifies the procedures by which a
         SNMPv2 entity recovers from a "crash."


         5.1.  Initial Configuration

         This section describes the initial configuration of a SNMPv2
         entity that supports the Digest Authentication Protocol or
         both the Digest Authentication Protocol and the Symmetric
         Privacy Protocol.

         When a network device is first installed, its initial, secure
         configuration must be done manually, i.e., a person must
         physically visit the device and enter the initial secret
         values for at least its first secure SNMPv2 party.  This
         requirement suggests that the person will have knowledge of
         the initial secret values.

         In general, the security of a system is enhanced as the number
         of entities that know a secret is reduced.  Requiring a person
         to physically visit a device every time a SNMPv2 party is
         configured not only exposes the secrets unnecessarily but is
         administratively prohibitive.  In particular, when MD5 is
         used, the initial authentication secret is 128 bits long and
         when DES is used an additional 128 bits are needed - 64 bits
         each for the key and initialization vector.  Clearly, these
         values will need to be recorded on a medium in order to be
         transported between a responsible management station and a
         managed agent.  The recommended procedure is to configure a
         small set of initial SNMPv2 parties for each SNMPv2 entity,
         one pair of which may be used initially to configure all other
         SNMPv2 parties.





         Galvin & McCloghrie                                  [Page 25]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         In fact, there is a minimal, useful set of SNMPv2 parties that
         could be configured between each responsible management
         station and managed agent.  This minimal set includes one of
         each of the following for both the responsible management
         station and the managed agent:

         o    a SNMPv2 party for which the authentication protocol and
              privacy protocol are the values noAuth and noPriv,
              respectively,

         o    a SNMPv2 party for which the authentication protocol
              identifies the mechanism defined in Section 1.5.1 and its
              privacy protocol is the value noPriv, and

         o    a SNMPv2 party for which the authentication protocol and
              privacy protocol identify the mechanisms defined in
              Section 1.5.1 and Section 1.5.2, respectively.

         The last of these SNMPv2 parties in both the responsible
         management station and the managed agent could be used to
         create all other SNMPv2 parties.

         Configuring one pair of SNMPv2 parties to be used to configure
         all other parties has the advantage of exposing only one pair
         of secrets - the secrets used to configure the minimal, useful
         set identified above.  To limit this exposure, the responsible
         management station should change these values as its first
         operation upon completion of the initial configuration.  In
         this way, secrets are known only to the peers requiring
         knowledge of them in order to communicate.

         The Management Information Base (MIB) document [4] supporting
         these security protocols specifies 6 initial party identities
         and initial values, which, by convention, are assigned to the
         parties and their associated parameters.

         These 6 initial parties are required to exist as part of the
         configuration of implementations when first installed, with
         the exception that implementations not providing support for a
         privacy protocol only need the 4 initial parties for which the
         privacy protocol is noPriv.  When installing a managed agent,
         these parties need to be configured with their initial
         secrets, etc., both in the responsible management station and
         in the new agent.






         Galvin & McCloghrie                                  [Page 26]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         If the responsible management station is configured first, it
         can be used to generate the initial secrets and provide them
         to a person, on a suitable medium, for distribution to the
         managed agent.  The following sequence of steps describes the
         initial configuration of a managed agent and its responsible
         management station.

         (1)  Determine the initial values for each of the attributes
              of the SNMPv2 party to be configured.  Some of these
              values may be computed by the responsible management
              station, some may be specified in the MIB document, and
              some may be administratively determined.

         (2)  Configure the parties in the responsible management
              station, according to the set of initial values.  If the
              management station is computing some initial values to be
              entered into the agent, an appropriate medium must be
              present to record the values.

         (3)  Configure the parties in the managed agent, according to
              the set of initial values.

         (4)  The responsible management station must synchronize the
              authentication clock values for each party it shares with
              each managed agent.  Section 5.3 specifies one strategy
              by which this could be accomplished.

         (5)  The responsible management station should change the
              secret values manually configured to ensure the actual
              values are known only to the peers requiring knowledge of
              them in order to communicate.  To do this, the management
              station generates new secrets for each party to be
              reconfigured and distributes the updates using any
              strategy which protects the new values from disclosure;
              use of a SNMPv2 set operation acting on the managed
              objects defined in [4] is such a strategy.  Upon
              receiving positive acknowledgement that the new values
              have been distributed, the management station should
              update its local database with the new values.

         If the managed agent does not support a protocol that protects
         messages from disclosure, e.g., the Symmetric Privacy Protocol
         (see section 5.4), then the distribution of new secrets, after
         the compromise of existing secrets, is not possible.  In this
         case, the new secrets can only be distributed by a physical





         Galvin & McCloghrie                                  [Page 27]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         visit to the device.

         If there are other SNMPv2 protocol entities requiring
         knowledge of the secrets, the responsible management station
         must distribute the information upon completion of the initial
         configuration.  The considerations, mentioned above,
         concerning the protection of secrets from disclosure, also
         apply in this case.


         5.2.  Clock Distribution

         A responsible management station must ensure that the
         authentication clock value for each SNMPv2 party for which it
         is responsible

         o    is loosely synchronized among all the local databases in
              which it appears,

         o    is reset, as indicated below, upon reaching its maximal
              value, and

         o    is non-decreasing, except as indicated below.

         The skew among the clock values must be accounted for in the
         lifetime value, in addition to the expected communication
         delivery delay.

         A skewed authentication clock may be detected by a number of
         strategies, including knowledge of the accuracy of the system
         clock, unauthenticated queries of the party database, and
         recognition of authentication failures originated by the
         party.

         Whenever clock skew is detected, and whenever the SNMPv2
         entities at both the responsible management station and the
         relevant managed agent support an appropriate privacy protocol
         (e.g., the Symmetric Privacy Protocol), a straightforward
         strategy for the correction of clock skew is simultaneous
         alteration of authentication clock and private key for the
         relevant SNMPv2 party.  If the request to alter the key and
         clock for a particular party originates from that same party,
         then, prior to transmitting that request, the local notion of
         the authentication clock is artificially advanced to assure
         acceptance of the request as authentic.





         Galvin & McCloghrie                                  [Page 28]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         More generally, however, since an authentication clock value
         need not be protected from disclosure, it is not necessary
         that a managed agent support a privacy protocol in order for a
         responsible management station to correct skewed clock values.
         The procedure for correcting clock skew in the general case is
         presented in Section 5.3.

         In addition to correcting skewed notions of authentication
         clocks, every SNMPv2 entity must react correctly as an
         authentication clock approaches its maximal value.  If the
         authentication clock for a particular SNMPv2 party ever
         reaches the maximal time value, the clock must halt at that
         value.  (The value of interest may be the maximum less
         lifetime.  When authenticating a message, its authentication
         timestamp is added to lifetime and compared to the
         authentication clock.  A SNMPv2 entity must guarantee that the
         sum is never greater than the maximal time value.) In this
         state, the only authenticated request a management station
         should generate for this party is one that alters the value of
         at least its authentication clock and private authentication
         key.  In order to reset these values, the responsible
         management station may set the authentication timestamp in the
         message to the maximal time value.

         The value of the authentication clock for a particular SNMPv2
         party must never be altered such that its new value is less
         than its old value, unless its private authentication key is
         also altered at the same time.


         5.3.  Clock Synchronization

         Unless the secrets are changed at the same time, the correct
         way to synchronize clocks is to advance the slower clock to be
         equal to the faster clock.  Suppose that party agentParty is
         realized by the SNMPv2 entity in a managed agent; suppose that
         party mgrParty is realized by the SNMPv2 entity in the
         corresponding responsible management station.  For any pair of
         parties, there are four possible conditions of the
         authentication clocks that could require correction:

         (1)  The management station's notion of the value of the
              authentication clock for agentParty exceeds the agent's
              notion.






         Galvin & McCloghrie                                  [Page 29]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         (2)  The management station's notion of the value of the
              authentication clock for mgrParty exceeds the agent's
              notion.

         (3)  The agent's notion of the value of the authentication
              clock for agentParty exceeds the management station's
              notion.

         (4)  The agent's notion of the value of the authentication
              clock for mgrParty exceeds the management station's
              notion.

         The selective clock acceleration mechanism intrinsic to the
         protocol corrects conditions 1, 2 and 3 as part of the normal
         processing of an authentic message.  Therefore, the clock
         adjustment procedure below does not provide for any
         adjustments in those cases.  Rather, the following sequence of
         steps specifies how the clocks may be synchronized when
         condition 4 is manifest.

         (1)  The responsible management station saves its existing
              notion of the authentication clock for the party
              mgrParty.

         (2)  The responsible management station retrieves the
              authentication clock value for mgrParty from the agent.
              This retrieval must be an unauthenticated request, since
              the management station does not know if the clocks are
              synchronized.  If the request fails, the clocks cannot be
              synchronized, and the clock adjustment procedure is
              aborted without further processing.

         (3)  If the notion of the authentication clock for mgrParty
              just retrieved from the agent exceeds the management
              station's notion, then condition 4 is manifest, and the
              responsible management station advances its notion of the
              authentication clock for mgrParty to match the agent's
              notion.

         (4)  The responsible management station retrieves the
              authentication clock value for mgrParty from the agent.
              This retrieval must be an authenticated request, in order
              that the management station may verify that the clock
              value is properly synchronized.  If this authenticated
              query fails, then the management station restores its





         Galvin & McCloghrie                                  [Page 30]





         RFC 1446        Security Protocols for SNMPv2       April 1993


              previously saved notion of the clock value, and the clock
              adjustment procedure is aborted without further
              processing.  Otherwise, clock synchronization has been
              successfully realized.

         Administrative advancement of a clock as described above does
         not introduce any new vulnerabilities, since the value of the
         clock is intended to increase with the passage of time.  A
         potential operational problem is the rejection of authentic
         management operations that were authenticated using a previous
         value of the relevant party clock.  This possibility may be
         avoided if a management station suppresses generation of
         management traffic between relevant parties while this clock
         adjustment procedure is in progress.


         5.4.  Secret Distribution

         This section describes one strategy by which a SNMPv2 entity
         that supports both the Digest Authentication Protocol and the
         Symmetric Privacy Protocol can change the secrets for a
         particular SNMPv2 party.

         The frequency with which the secrets of a SNMPv2 party should
         be changed is a local administrative issue.  However, the more
         frequently a secret is used, the more frequently it should be
         changed.  At a minimum, the secrets must be changed whenever
         the associated authentication clock approaches its maximal
         value (see Section 6).  Note that, owing to both
         administrative and automatic advances of the authentication
         clock described in this memo, the authentication clock for a
         SNMPv2 party may well approach its maximal value sooner than
         might otherwise be expected.

         The following sequence of steps specifies how a responsible
         management station alters a secret value (i.e., the private
         authentication key or the private privacy key) for a
         particular SNMPv2 party.  There are two cases.

         First, setting the initial secret for a new party:

         (1)  The responsible management station generates a new secret
              value.







         Galvin & McCloghrie                                  [Page 31]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         (2)  The responsible management station encapsulates a SNMPv2
              setRequest in a SNMPv2 private management communication
              with at least the following properties.

                   Its source supports the Digest Authentication
                   Protocol and the Symmetric Privacy Protocol.

                   Its destination supports the Symmetric Privacy
                   Protocol and the Digest Authentication Protocol.

         (3)  The SNMPv2 private management communication is
              transmitted to its destination.

         (4)  Upon receiving the request, the recipient processes the
              message according to [12] and [1].

         (5)  The recipient encapsulates a SNMPv2 response in a SNMPv2
              private management communication with at least the
              following properties.

                   Its source supports the Digest Authentication
                   Protocol and the Symmetric Privacy Protocol.

                   Its destination supports the Symmetric Privacy
                   Protocol and the Digest Authentication Protocol.

         (6)  The SNMPv2 private management communication is
              transmitted to its destination.

         (7)  Upon receiving the response, the responsible management
              station updates its local database with the new value.

         Second, modifying the current secret of an existing party:

         (1)  The responsible management station generates a new secret
              value.

         (2)  The responsible management station encapsulates a SNMPv2
              setRequest in a SNMPv2 management communication with at
              least the following properties.

                   Its source and destination supports the Digest
                   Authentication Protocol.







         Galvin & McCloghrie                                  [Page 32]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         (3)  The SNMPv2 private management communication is
              transmitted to its destination.

         (4)  Upon receiving the request, the recipient processes the
              message according to [12] and [1].

         (5)  The recipient encapsulates a SNMPv2 response in a SNMPv2
              management communication with at least the following
              properties.

                   Its source and destination supports the Digest
                   Authentication Protocol.

         (6)  The SNMPv2 management communication is transmitted to its
              destination.

         (7)  Upon receiving the response, the responsible management
              station updates its local database with the new value.

         If the responsible management station does not receive a
         response to its request, there are two possible causes.

         o    The request may not have been delivered to the
              destination.

         o    The response may not have been delivered to the
              originator of the request.

         In order to distinguish the two possible error conditions, a
         responsible management station could check the destination to
         see if the change has occurred.  Unfortunately, since the
         secret values are unreadable, this is not directly possible.

         The recommended strategy for verifying key changes is to set
         the public value corresponding to the secret being changed to
         a recognizable, novel value: that is, alter the public
         authentication key value for the relevant party when changing
         its private authentication key, or alter its public privacy
         key value when changing its private privacy key.  In this way,
         the responsible management station may retrieve the public
         value when a response is not received, and verify whether or
         not the change has taken place.  (This strategy is available
         since the public values are not used by the protocols defined
         in this memo.  If this strategy is employed, then the public
         values are significant in this context.  Of course, protocols





         Galvin & McCloghrie                                  [Page 33]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         using the public values may make use of this strategy
         directly.)

         One other scenario worthy of mention is using a SNMPv2 party
         to change its own secrets.  In this case, the destination will
         change its local database prior to generating a response.
         Thus, the response will be constructed according to the new
         value.  However, the responsible management station will not
         update its local database until after the response is
         received.  This suggests the responsible management station
         may receive a response which will be evaluated as unauthentic,
         unless the correct secret is used.  The responsible management
         station may either account for this scenario as a special
         case, or use an alteration of the relevant public values (as
         described above) to verify the key change.

         Note, during the period of time after the request has been
         sent and before the response is received, the management
         station must keep track of both the old and new secret values.
         Since the delay may be the result of a network failure, the
         management station must be prepared to retain both values for
         an extended period of time, including across reboots.


         5.5.  Crash Recovery

         This section describes the requirements for SNMPv2 protocol
         entities in connection with recovery from system crashes or
         other service interruptions.

         For each SNMPv2 party in the local database for a particular
         SNMPv2 entity, its identity, authentication clock, private
         authentication key, and private privacy key must enjoy non-
         volatile, incorruptible representations.  If possible,
         lifetime should also enjoy a non-volatile, incorruptible
         representation.  If said SNMPv2 entity supports other security
         protocols or algorithms in addition to the two defined in this
         memo, then the authentication protocol and the privacy
         protocol for each party also require non-volatile,
         incorruptible representation.

         The authentication clock of a SNMPv2 party is a critical
         component of the overall security of the protocols.  The
         inclusion of a reliable representation of a clock in a SNMPv2
         entity is required for overall security.  A reliable clock





         Galvin & McCloghrie                                  [Page 34]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         representation ensures that a clock's value is monotonically
         increasing, even across a power loss or other system failure
         of the local SNMPv2 entity.  One example of a reliable clock
         representation is that provided by battery-powered clock-
         calendar devices incorporated into some contemporary systems.
         Another example is storing and updating a clock value in non-
         volatile storage at a frequency of once per U (e.g., 24)
         hours, and re-initialising that clock value on every reboot as
         the stored value plus U+1 hours.  It is assumed that
         management stations always support reliable clock
         representations, where clock adjustment by a human operator
         during crash recovery may contribute to that reliability.

         If a managed agent crashes and does not reboot in time for its
         responsible management station to prevent its authentication
         clock from reaching its maximal value, upon reboot the clock
         must be halted at its maximal value.  The procedures specified
         in Section 5.3 would then apply.

         Upon recovery, those attributes of each SNMPv2 party that do
         not enjoy non-volatile or reliable representation are
         initialized as follows.

         o    If the private authentication key is not the OCTET STRING
              of zero length, the authentication protocol is set to
              identify use of the Digest Authentication Protocol in
              conjunction with the algorithm specified in Section
              1.5.1.

         o    If the lifetime is not retained, it should be initialized
              to zero.

         o    If the private privacy key is not the OCTET STRING of
              zero length, the privacy protocol is set to identify use
              of the Symmetric Privacy Protocol in conjunction with the
              algorithm specified in Section 1.5.2.

         Upon detecting that a managed agent has rebooted, a
         responsible management station must reset all other party
         attributes, including the lifetime if it was not retained.  In
         order to reset the lifetime, the responsible management
         station should set the authentication timestamp in the message
         to the sum of the authentication clock and desired lifetime.
         This is an artificial advancement of the authentication
         timestamp in order to guarantee the message will be authentic





         Galvin & McCloghrie                                  [Page 35]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         when received by the recipient.

















































         Galvin & McCloghrie                                  [Page 36]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         6.  Security Considerations

         This section highlights security considerations relevant to
         the protocols and procedures defined in this memo.  Practices
         that contribute to secure, effective operation of the
         mechanisms defined here are described first.  Constraints on
         implementation behavior that are necessary to the security of
         the system are presented next.  Finally, an informal account
         of the contribution of each mechanism of the protocols to the
         required goals is presented.


         6.1.  Recommended Practices

         This section describes practices that contribute to the
         secure, effective operation of the mechanisms defined in this
         memo.

         o    A management station should discard SNMPv2 responses for
              which neither the request-id component nor the
              represented management information corresponds to any
              currently outstanding request.

              Although it would be typical for a management station to
              do this as a matter of course, in the context of these
              security protocols it is significant owing to the
              possibility of message duplication (malicious or
              otherwise).

         o    A management station should not interpret an agent's lack
              of response to an authenticated SNMPv2 management
              communication as a conclusive indication of agent or
              network failure.

              It is possible for authentication failure traps to be
              lost or suppressed as a result of authentication clock
              skew or inconsistent notions of shared secrets.  In order
              either to facilitate administration of such SNMPv2
              parties or to provide for continued management in times
              of network stress, a management station implementation
              may provide for arbitrary, artificial advancement of the
              timestamp or selection of shared secrets on locally
              generated messages.







         Galvin & McCloghrie                                  [Page 37]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         o    The lifetime value for a SNMPv2 party should be chosen
              (by the local administration) to be as small as possible,
              given the accuracy of clock devices available, relevant
              round-trip communications delays, and the frequency with
              which a responsible management station will be able to
              verify all clock values.

              A large lifetime increases the vulnerability to malicious
              delays of SNMPv2 messages.  The implementation of a
              management station may accommodate changing network
              conditions during periods of network stress by
              effectively increasing the lifetimes of the source and
              destination parties.  The management station accomplishes
              this by artificially advancing its notion of the source
              party's clock on messages it sends, and by artificially
              increasing its notion of the source party`s lifetime on
              messages it receives.

         o    When sending state altering messages to a managed agent,
              a management station should delay sending successive
              messages to the managed agent until a positive
              acknowledgement is received for the previous message or
              until the previous message expires.

              No message ordering is imposed by the SNMPv2.  Messages
              may be received in any order relative to their time of
              generation and each will be processed in the ordered
              received.  Note that when an authenticated message is
              sent to a managed agent, it will be valid for a period of
              time that does not exceed lifetime under normal
              circumstances, and is subject to replay during this
              period.

              Indeed, a management station must cope with the loss and
              re-ordering of messages resulting from anomalies in the
              network as a matter of course.

              However, a managed object, snmpSetSerialNo [14], is
              specifically defined for use with SNMPv2 set operations
              in order to provide a mechanism to ensure the processing
              of SNMPv2 messages occurs in a specific order.

         o    The frequency with which the secrets of a SNMPv2 party
              should be changed is indirectly related to the frequency
              of their use.





         Galvin & McCloghrie                                  [Page 38]





         RFC 1446        Security Protocols for SNMPv2       April 1993


              Protecting the secrets from disclosure is critical to the
              overall security of the protocols.  Frequent use of a
              secret provides a continued source of data that may be
              useful to a cryptanalyst in exploiting known or perceived
              weaknesses in an algorithm.  Frequent changes to the
              secret avoid this vulnerability.

              Changing a secret after each use is generally regarded as
              the most secure practice, but a significant amount of
              overhead may be associated with that approach.

              Note, too, in a local environment the threat of
              disclosure may be insignificant, and as such the changing
              of secrets may be less frequent.  However, when public
              data networks are the communication paths, more caution
              is prudent.

         o    In order to foster the greatest degree of security, a
              management station implementation must support
              constrained, pairwise sharing of secrets among SNMPv2
              entities as its default mode of operation.

              Owing to the use of symmetric cryptography in the
              protocols defined here, the secrets associated with a
              particular SNMPv2 party must be known to all other SNMPv2
              parties with which that party may wish to communicate.
              As the number of locations at which secrets are known and
              used increases, the likelihood of their disclosure also
              increases, as does the potential impact of that
              disclosure.  Moreover, if the set of SNMPv2 protocol
              entities with knowledge of a particular secret numbers
              more than two, data origin cannot be reliably
              authenticated because it is impossible to determine with
              any assurance which entity of that set may be the
              originator of a particular SNMPv2 message.  Thus, the
              greatest degree of security is afforded by configurations
              in which the secrets for each SNMPv2 party are known to
              at most two protocol entities.


         6.2.  Conformance

         A SNMPv2 entity implementation that claims conformance to this
         memo must satisfy the following requirements:






         Galvin & McCloghrie                                  [Page 39]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         (1)  It must implement the noAuth and noPriv protocols whose
              object identifiers are defined in [4].

                   noAuth  This protocol signifies that messages
                   generated by a party using it are not protected as
                   to origin or integrity.  It is required to ensure
                   that a party's authentication clock is always
                   accessible.

                   noPriv  This protocol signifies that messages
                   received by a party using it are not protected from
                   disclosure.  It is required to ensure that a party's
                   authentication clock is always accessible.

         (2)  It must implement the Digest Authentication Protocol in
              conjunction with the algorithm defined in Section 1.5.1.

         (3)  It must include in its local database at least one SNMPv2
              party with the following parameters set as follows:

                   partyAuthProtocol is set to noAuth and

                   partyPrivProtocol is set to noPriv.

              This party must have a MIB view [1] specified that
              includes at least the authentication clock of all other
              parties.  Alternatively, the authentication clocks of the
              other parties may be partitioned among several similarly
              configured parties according to a local implementation
              convention.

         (4)  For each SNMPv2 party about which it maintains
              information in a local database, an implementation must
              satisfy the following requirements:

                   (a) It must not allow a party's parameters to be set
                   to a value inconsistent with its expected syntax.
                   In particular, Section 1.4 specifies constraints for
                   the chosen mechanisms.

                   (b) It must, to the maximal extent possible,
                   prohibit read-access to the private authentication
                   key and private encryption key under all
                   circumstances except as required to generate and/or
                   validate SNMPv2 messages with respect to that party.





         Galvin & McCloghrie                                  [Page 40]





         RFC 1446        Security Protocols for SNMPv2       April 1993


                   This prohibition includes prevention of read-access
                   by the entity's human operators.

                   (c) It must allow the party's authentication clock
                   to be publicly accessible.  The correct operation of
                   the Digest Authentication Protocol requires that it
                   be possible to determine this value at all times in
                   order to guarantee that skewed authentication clocks
                   can be resynchronized.

                   (d) It must prohibit alterations to its record of
                   the authentication clock for that party
                   independently of alterations to its record of the
                   private authentication key (unless the clock
                   alteration is an advancement).

                   (e) It must never allow its record of the
                   authentication clock for that party to be
                   incremented beyond the maximal time value and so
                   "roll-over" to zero.

                   (f) It must never increase its record of the
                   lifetime for that party except as may be explicitly
                   authorized (via imperative command or securely
                   represented configuration information) by the
                   responsible network administrator.

                   (g) In the event that the non-volatile,
                   incorruptible representations of a party's
                   parameters (in particular, either the private
                   authentication key or private encryption key) are
                   lost or destroyed, it must alter its record of these
                   quantities to random values so subsequent
                   interaction with that party requires manual
                   redistribution of new secrets and other parameters.

         (5)  If it selects new value(s) for a party's secret(s), it
              must avoid bad or obvious choices for said secret(s).
              Choices to be avoided are boundary values (such as all-
              zeros) and predictable values (such as the same value as
              previously or selecting from a predetermined set).

         (6)  It must ensure that a received message for which the
              originating party uses the Digest Authentication Protocol
              but the receiving party does not, is always declared to





         Galvin & McCloghrie                                  [Page 41]





         RFC 1446        Security Protocols for SNMPv2       April 1993


              be unauthentic.  This may be achieved explicitly via an
              additional step in the procedure for processing a
              received message, or implicitly by verifying that all
              local access control policies enforce this requirement.


         6.3.  Protocol Correctness

         The correctness of these SNMPv2 security protocols with
         respect to the stated goals depends on the following
         assumptions:

         (1)  The chosen message digest algorithm satisfies its design
              criteria.  In particular, it must be computationally
              infeasible to discover two messages that share the same
              digest value.

         (2)  It is computationally infeasible to determine the secret
              used in calculating a digest on the concatenation of the
              secret and a message when both the digest and the message
              are known.

         (3)  The chosen symmetric encryption algorithm satisfies its
              design criteria.  In particular, it must be
              computationally infeasible to determine the cleartext
              message from the ciphertext message without knowledge of
              the key used in the transformation.

         (4)  Local notions of a party's authentication clock while it
              is associated with a specific private key value are
              monotonically non-decreasing (i.e., they never run
              backwards) in the absence of administrative
              manipulations.

         (5)  The secrets for a particular SNMPv2 party are known only
              to authorized SNMPv2 protocol entities.

         (6)  Local notions of the authentication clock for a
              particular SNMPv2 party are never altered such that the
              authentication clock's new value is less than the current
              value without also altering the private authentication
              key.

         For each mechanism of the protocol, an informal account of its
         contribution to the required goals is presented below.





         Galvin & McCloghrie                                  [Page 42]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         Pseudocode fragments are provided where appropriate to
         exemplify possible implementations; they are intended to be
         self-explanatory.


         6.3.1.  Clock Monotonicity Mechanism

         By pairing each sequence of a clock's values with a unique
         key, the protocols partially realize goal 3, and the
         conjunction of this property with assumption 6 above is
         sufficient for the claim that, with respect to a specific
         private key value, all local notions of a party's
         authentication clock are, in general, non-decreasing with
         time.


         6.3.2.  Data Integrity Mechanism

         The protocols require computation of a message digest computed
         over the SNMPv2 message prepended by the secret for the
         relevant party.  By virtue of this mechanism and assumptions 1
         and 2, the protocols realize goal 1.

         Normally, the inclusion of the message digest value with the
         digested message would not be sufficient to guarantee data
         integrity, since the digest value can be modified in addition
         to the message while it is enroute.  However, since not all of
         the digested message is included in the transmission to the
         destination, it is not possible to substitute both a message
         and a digest value while enroute to a destination.

         Strictly speaking, the specified strategy for data integrity
         does not detect a SNMPv2 message modification which appends
         extraneous material to the end of such messages.  However,
         owing to the representation of SNMPv2 messages as ASN.1
         values, such modifications cannot - consistent with goal 1 -
         result in unauthorized management operations.

         The data integrity mechanism specified in this memo protects
         only against unauthorized modification of individual SNMPv2
         messages.  A more general data integrity service that affords
         protection against the threat of message stream modification
         is not realized by this mechanism, although limited protection
         against reordering, delay, and duplication of messages within
         a message stream are provided by other mechanisms of the





         Galvin & McCloghrie                                  [Page 43]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         protocol.


         6.3.3.  Data Origin Authentication Mechanism

         The data integrity mechanism requires the use of a secret
         value known only to communicating parties.  By virtue of this
         mechanism and assumptions 1 and 2, the protocols explicitly
         prevent unauthorized modification of messages.  Data origin
         authentication is implicit if the message digest value can be
         verified.  That is, the protocols realize goal 2.


         6.3.4.  Restricted Administration Mechanism

         This memo requires that implementations preclude
         administrative alterations of the authentication clock for a
         particular party independently from its private authentication
         key (unless that clock alteration is an advancement).  An
         example of an efficient implementation of this restriction is
         provided in a pseudocode fragment below.  This pseudocode
         fragment meets the requirements of assumption 6.  Observe that
         the requirement is not for simultaneous alteration but to
         preclude independent alteration.  This latter requirement is
         fairly easily realized in a way that is consistent with the
         defined semantics of the SNMPv2 set operation.
























         Galvin & McCloghrie                                  [Page 44]





         RFC 1446        Security Protocols for SNMPv2       April 1993


              Void partySetKey (party, newKeyValue)
              {
                  if (party->clockAltered) {
                     party->clockAltered = FALSE;
                     party->keyAltered = FALSE;
                     party->keyInUse = newKeyValue;
                     party->clockInUse = party->clockCache;
                  }
                  else {
                     party->keyAltered = TRUE;
                     party->keyCache = newKeyValue;
                  }
              }

              Void partySetClock (party, newClockValue)
              {
                  if (party->keyAltered) {
                     party->keyAltered = FALSE;
                     party->clockAltered = FALSE;
                     party->clockInUse = newClockValue;
                     party->keyInUse = party->keyCache;
                  }
                  else {
                     party->clockAltered = TRUE;
                     party->clockCache = newClockValue;
                  }
              }


         6.3.5.  Message Timeliness Mechanism

         The definition of the SNMPv2 security protocols requires that,
         if the authentication timestamp value on a received message -
         augmented by an administratively chosen lifetime value - is
         less than the local notion of the clock for the originating
         SNMPv2 party, the message is not delivered.


              if (timestampOfReceivedMsg +
                     party->administrativeLifetime <=
                     party->localNotionOfClock) {
                     msgIsValidated = FALSE;
              }







         Galvin & McCloghrie                                  [Page 45]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         By virtue of this mechanism, the protocols realize goal 3.  In
         cases in which the local notions of a particular SNMPv2 party
         clock are moderately well-synchronized, the timeliness
         mechanism effectively limits the age of validly delivered
         messages.  Thus, if an attacker diverts all validated messages
         for replay much later, the delay introduced by this attack is
         limited to a period that is proportional to the skew among
         local notions of the party clock.


         6.3.6.  Selective Clock Acceleration Mechanism

         The definition of the SNMPv2 security protocols requires that,
         if either of the timestamp values for the originating or
         receiving parties on a received, validated message exceeds the
         corresponding local notion of the clock for that party, then
         the local notion of the clock for that party is adjusted
         forward to correspond to said timestamp value.  This mechanism
         is neither strictly necessary nor sufficient to the security
         of the protocol; rather, it fosters the clock synchronization
         on which valid message delivery depends - thereby enhancing
         the effectiveness of the protocol in a management context.


              if (msgIsValidated) {
                     if (timestampOfReceivedMsg >
                           party->localNotionOfClock) {
                           party->localNotionOfClock =
                                 timestampOfReceivedMsg;
                     }
              }


         The effect of this mechanism is to synchronize local notions
         of a party clock more closely in the case where a sender's
         notion is more advanced than a receiver's.  In the opposite
         case, this mechanism has no effect on local notions of a party
         clock and either the received message is validly delivered or
         not according to other mechanisms of the protocol.

         Operation of this mechanism does not, in general, improve the
         probability of validated delivery for messages generated by
         party participants whose local notion of the party clock is
         relatively less advanced.  In this case, queries from a
         management station may not be validly delivered and the





         Galvin & McCloghrie                                  [Page 46]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         management station needs to react appropriately (e.g., by use
         of the strategy described in section 5.3).  In contrast, the
         delivery of SNMPv2 trap messages generated by an agent that
         suffers from a less advanced notion of a party clock is more
         problematic, for an agent may lack the capacity to recognize
         and react to security failures that prevent delivery of its
         messages.  Thus, the inherently unreliable character of trap
         messages is likely to be compounded by attempts to provide for
         their validated delivery.


         6.3.7.  Confidentiality Mechanism

         The protocols require the use of a symmetric encryption
         algorithm when the data confidentiality service is required.
         By virtue of this mechanism and assumption 3, the protocols
         realize goal 4.

































         Galvin & McCloghrie                                  [Page 47]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         7.  Acknowledgements

         This document is based, almost entirely, on RFC 1352.















































         Galvin & McCloghrie                                  [Page 48]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         8.  References

         [1]  Galvin, J., and McCloghrie, K., "Administrative Model for
              version 2 of the Simple Network Management Protocol
              (SNMPv2)", RFC 1445, Trusted Information Systems, Hughes
              LAN Systems, April 1993.

         [2]  Case, J., Fedor, M., Schoffstall, M., Davin, J., "Simple
              Network Management Protocol", STD 15, RFC 1157, SNMP
              Research, Performance Systems International, MIT
              Laboratory for Computer Science, May 1990.

         [3]  Rivest, R., "The MD5 Message-Digest Algorithm", RFC 1321,
              MIT Laboratory for Computer Science, April 1992.

         [4]  McCloghrie, K., and Galvin, J., "Party MIB for version 2
              of the Simple Network Management Protocol (SNMPv2)", RFC
              1447, Hughes LAN Systems, Trusted Information Systems,
              April 1993.

         [5]  Data Encryption Standard, National Institute of Standards
              and Technology.  Federal Information Processing Standard
              (FIPS) Publication 46-1.  Supersedes FIPS Publication 46,
              (January, 1977; reaffirmed January, 1988).

         [6]  Data Encryption Algorithm, American National Standards
              Institute.  ANSI X3.92-1981, (December, 1980).

         [7]  DES Modes of Operation, National Institute of Standards
              and Technology.  Federal Information Processing Standard
              (FIPS) Publication 81, (December, 1980).

         [8]  Data Encryption Algorithm - Modes of Operation, American
              National Standards Institute.  ANSI X3.106-1983, (May
              1983).

         [9]  Guidelines for Implementing and Using the NBS Data
              Encryption Standard, National Institute of Standards and
              Technology.  Federal Information Processing Standard
              (FIPS) Publication 74, (April, 1981).

         [10] Validating the Correctness of Hardware Implementations of
              the NBS Data Encryption Standard, National Institute of
              Standards and Technology.  Special Publication 500-20.






         Galvin & McCloghrie                                  [Page 49]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         [11] Maintenance Testing for the Data Encryption Standard,
              National Institute of Standards and Technology.  Special
              Publication 500-61, (August, 1980).

         [12] Case, J., McCloghrie, K., Rose, M., and Waldbusser, S.,
              "Protocol Operations for version 2 of the Simple Network
              Management Protocol (SNMPv2)", RFC 1448, SNMP Research,
              Inc., Hughes LAN Systems, Dover Beach Consulting, Inc.,
              Carnegie Mellon University, April 1993.

         [13] Case, J., McCloghrie, K., Rose, M., and Waldbusser, S.,
              "Transport Mappings for version 2 of the Simple Network
              Management Protocol (SNMPv2)", RFC 1449, SNMP Research,
              Inc., Hughes LAN Systems, Dover Beach Consulting, Inc.,
              Carnegie Mellon University, April 1993.

         [14] Case, J., McCloghrie, K., Rose, M., and Waldbusser, S.,
              "Management Information Base for version 2 of the Simple
              Network Management Protocol (SNMPv2)", RFC 1450, SNMP
              Research, Inc., Hughes LAN Systems, Dover Beach
              Consulting, Inc., Carnegie Mellon University, April 1993.





























         Galvin & McCloghrie                                  [Page 50]





         RFC 1446        Security Protocols for SNMPv2       April 1993


         9.  Authors' Addresses

              James M. Galvin
              Trusted Information Systems, Inc.
              3060 Washington Road, Route 97
              Glenwood, MD 21738

              Phone:  +1 301 854-6889
              EMail:  [email protected]


              Keith McCloghrie
              Hughes LAN Systems
              1225 Charleston Road
              Mountain View, CA  94043
              US

              Phone: +1 415 966 7934
              Email: [email protected]































         Galvin & McCloghrie                                  [Page 51]