[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference azur::mcc

Title:DECmcc user notes file. Does not replace IPMT.
Notice:Use IPMT for problems. Newsletter location in note 6187
Moderator:TAEC::BEROUD
Created:Mon Aug 21 1989
Last Modified:Wed Jun 04 1997
Last Successful Update:Fri Jun 06 1997
Number of topics:6497
Total number of notes:27359

4363.0. "SNMP access to DECbridges" by ICS::SHETHAR () Fri Jan 08 1993 15:44

    
    
    	Greetings,
    
    	I am playing around with DECbridge 5xx and FDDI concentrators.
    	I am fooling with managing them through SNMP, and have added
    	the bridge and FDDI mibs to do that.  One thing puzzles me though,
    	once you assign an IP address to either of these devices, how
    	do you prevent someone from "setting" something on them.  I know
    	the "SNMP sets allowed" feature, although in the documentatin, was
    	never implemented for either device.  So how do you prevent someone
    	from doing snmp "sets" and possibly fouling up your
        bridge/concentrator?
    
    	Thanks for any inpu...
    
    	Alan
    
T.RTitleUserPersonal
Name
DateLines
4363.1MOLAR::YAHEY::BOSESat Jan 09 1993 16:207
	Set a write (or read-write) community name which only selected
	people know about. You might be also able to provide set access
	to only specific nodes (by providing a list of ip addresses with
	write access while setting up communities).

	Rahul.
4363.2But community names offer no securityFARMS::LYONSAhh, but fortunately, I have the key to escape reality.Mon Jan 11 1993 12:304
    Of course, my SNMP Snooper will notice the set with community name and
    log it for "future" reference, bypassing any attempt at security.
    I can fake the packet with almost no problem, as IP has even less
    security than DECnet.
4363.3Security?MOLAR::CHRISB::BRIENENNetwork Management Applications!Mon Jan 11 1993 12:587
>    Of course, my SNMP Snooper will notice the set with community name and
>    log it for "future" reference, bypassing any attempt at security.

  The above is trivial to do with DECnet, and only slightly more difficult
  to do with LAT (the code exists). What's the point?

						Chris
4363.4FARMS::LYONSAhh, but fortunately, I have the key to escape reality.Mon Jan 11 1993 14:464
The point was (is, will be) that it is FAR easier to fake this stuff for an 
IP network than for DECnet (its not exactly trivial for the DECnet case,
easy, but not trivial), so dont ever rely on the "secret" of a community name
for security with devices that support SNMP (and set operations).
4363.5MOLAR::YAHEY::BOSEMon Jan 11 1993 16:182
	That's why they have SNMP V2.0.