On Wed, Jun 25, 2008 at 12:01:46PM -0700, Randy Presuhn wrote:

> > Depending on how the snmpEngineID is constructed, it may contain the
> > enterprise ID identifying the device manufacturer or it may contain a
> > MAC address which is otherwise not accessibe (and which also gives a
> > hint about the manufacturer), or it might contain an administratively
> > assigned text that might be useful to further target an attack.
> > 
> > Is this something to be seriously worried about? I can't judge. Do we
> > have such text in USM RFC 3414? Obviously not. Is the fact that USM is
> > silent about this sufficient to not be worried? Again, I can't judge.
> 
> Though obviously not the same, I'd lump this in with RFC 3414's
> commentary on traffic analysis attacks.

Well, as you said, this is not the same. ;-)

> The recommended VACM configuration in appendix A of RFC 3415 gives
> noAuthNoPriv read access to this information anyway.

Not necessarily if you choose an "initial-no-access-configuration" (or
I am misreading the A.1 item 5).

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1, 28759 Bremen, Germany
Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>
_______________________________________________
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art

Reply via email to