Re: WG Review: Recharter of Integrated Security Model for SNMP (isms)

2005-09-14 Thread C. M. Heard
On Wed, 7 Sep 2005, The IESG wrote:
 A modified charter has been submitted for the Integrated
 Security Model for SNMP (isms) working group in the Security
 Area of the IETF.
...
 In order to leverage the authentication information already
 accessible at managed devices, the new security model will
 use the SSH protocol for message protection, and RADIUS for
 AAA-provisioned user authentication and authorization.
 However, the integration of a transport mapping security model
 into the SNMPv3 architecture should be defined such that it is
 open to support potential alternative transport mappings to
 protocols such as BEEP and TLS.
 
 The new security model must not modify any other aspects of
 SNMPv3 protocol as defined in STD 62 (e.g., it must not create
 new PDU types).

If (as I have gathered from the discussion over the past few days)
the last sentence quoted above means that it is out of scope for the
working group to even consider solutions that allow agents and
managers to work on either side of firewalls or NATs, then I think
that the charter is drawn too narrowly and should be revised.
Indeed, I think that it should be an explicit goal (if not a
requirement) for the solution to work even when one of the parties
(agent or manager) is unable to accept incoming TCP connections.
That issue will have to be addressed eventually, and it is better
for implementors to go through the churn once rather than twice.

Mike Heard

P.S.  Note that I am using the words agent and manager in the
traditional sense, i.e., to mean notification originator + command
responder and notification receiver + command generator
respectively.


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


WG Review: Recharter of Integrated Security Model for SNMP (isms)

2005-09-07 Thread The IESG
A modified charter has been submitted for the Integrated Security Model for 
SNMP (isms)
working group in the Security Area of the IETF. The IESG has not made any 
determination as yet. The modified charter is provided below for informational 
purposes only. Please send your comments to the IESG mailing list 
(iesg@ietf.org) 
by September 14.

+++

Integrated Security Model for SNMP (isms)
=

Current Status: Active Working Group

Chair(s):
Ken Hornstein [EMAIL PROTECTED]
Juergen Quittek [EMAIL PROTECTED]

Security Area Director(s):
Sam Hartman [EMAIL PROTECTED]
Russell Housley [EMAIL PROTECTED]

Security Area Advisor:
Sam Hartman [EMAIL PROTECTED]

Mailing Lists:
General discussion: [EMAIL PROTECTED]
To (un)subscribe: [EMAIL PROTECTED]
in body: (un)subscribe
Archive: 
http://www.ietf.org/mail-archive/working-groups/isms/current/maillist.html

Description of Working Group:

The Simple Network Management Protocol version 3 (SNMPv3) provides
message security services through the security subsystem, for which
there is one currently defined model - the User-based Security Model
(USM). However, the USM approach has seen limited deployment so far.
One frequently reported reasons is the lack of integration of USM
key and user management into deployed authentication infrastructures.

SSH is a widely deployed access protocol for remote devices configuration.
Many devices support the integration of SSH user authentication with
AAA systems via protocols such as RADIUS.

The goal of the ISMS working group is developing a new security model
for SNMP that integrates with widely deployed user and key management
systems, as a supplement to the USM security model.

For this integration the working group will define a standard method
for mapping from AAA-provisioned authorization parameter(s) to
corresponding SNMP parameters.

In order to leverage the authentication information already accessible
at managed devices, the new security model will use the SSH protocol
for message protection, and RADIUS for AAA-provisioned user authentication
and authorization.
However, the integration of a transport mapping security model into
the SNMPv3 architecture should be defined such that it is open to support
potential alternative transport mappings to protocols such as BEEP and TLS.

The new security model must not modify any other aspects of SNMPv3
protocol as defined in STD 62 (e.g., it must not create new PDU types).

Work on new access control models or centralized administration of
View-based Access Control Model (VACM) rules and mappings is outside
the scope of the working group.

The working group will cover the following work items:

- Specify an architectural extension that describes how transport
mapping security models (TMSMs) fit into the SNMPv3 architecture.
- Specify an architectural extension that describes how to perform a
mapping from AAA-provisioned user-authentication and authorization
parameter(s)to securityName and other corresponding SNMP parameters.
- Specify a mapping from RADIUS-provisioned authentication and
authorization parameter(s) to securityName and other corresponding
SNMP parameters. This item may be a RADEXT work item last-aclled
in both groups.
- Specify a mapping from locally-provisioned authentication and
authorization parameter(s) to securityName and other corresponding
SNMP parameters.
- Define how to use SSH between the two SNMP engines
- Specify the SSH security model for SNMP.

Goals an Milestones:

Oct 2005 Initial version of a general transport mapping security models
(TMSMs) document that specifies how TMSMs fit into the SNMPv3
architecture and that defines the requirements for transport
mapping security models.
Oct 2005 Initial version of a document specifying the SSH security
model for SNMP.
Dec 2006 Initial version of a document specifying the RADIUS
authentication and authorization mapping model for SNMP.
Feb 2006 Initial version of an applicability statement that sets up
reasonable mandatory to implement methods.
Feb 2006 Submit TMSM document to IESG
Jun 2006 Submit SSH TMSM to IESG
Jun 2006 Submit RADIUS mapping model for SNMP to IESG
Aug 2006 Submit applicability statement to IESG 


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce