--- 1/draft-ietf-opsawg-hmac-sha-2-usm-snmp-03.txt 2015-03-23 07:14:53.980632312 -0700 +++ 2/draft-ietf-opsawg-hmac-sha-2-usm-snmp-04.txt 2015-03-23 07:14:54.008632995 -0700 @@ -1,19 +1,19 @@ OPSAWG J. Merkle, Ed. Internet-Draft Secunet Security Networks Intended status: Standards Track M. Lochter -Expires: August 22, 2015 BSI - February 18, 2015 +Expires: September 24, 2015 BSI + March 23, 2015 HMAC-SHA-2 Authentication Protocols in USM for SNMP - draft-ietf-opsawg-hmac-sha-2-usm-snmp-03 + draft-ietf-opsawg-hmac-sha-2-usm-snmp-04 Abstract This memo specifies new HMAC-SHA-2 authentication protocols for the User-based Security Model (USM) for SNMPv3 defined in RFC 3414. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. @@ -21,21 +21,21 @@ Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." - This Internet-Draft will expire on August 22, 2015. + This Internet-Draft will expire on September 24, 2015. Copyright Notice Copyright (c) 2015 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents @@ -56,29 +56,30 @@ 4.2. Processing . . . . . . . . . . . . . . . . . . . . . . . 5 4.2.1. Processing an Outgoing Message . . . . . . . . . . . 5 4.2.2. Processing an Incoming Message . . . . . . . . . . . 6 5. Key Localization and Key Change . . . . . . . . . . . . . . . 6 6. Structure of the MIB Module . . . . . . . . . . . . . . . . . 6 7. Relationship to Other MIB Modules . . . . . . . . . . . . . . 7 7.1. Relationship to SNMP-USER-BASED-SM-MIB . . . . . . . . . 7 7.2. Relationship to SNMP-FRAMEWORK-MIB . . . . . . . . . . . 7 7.3. MIB modules required for IMPORTS . . . . . . . . . . . . 7 8. Definitions . . . . . . . . . . . . . . . . . . . . . . . . . 7 - 9. Security Considerations . . . . . . . . . . . . . . . . . . . 9 - 9.1. Use of the HMAC-SHA-2 authentication protocols in USM . . 9 + 9. Security Considerations . . . . . . . . . . . . . . . . . . . 10 + 9.1. Use of the HMAC-SHA-2 authentication protocols in USM . . 10 9.2. Cryptographic strength of the authentication protocols . 10 9.3. Derivation of keys from passwords . . . . . . . . . . . . 11 9.4. Access to the SNMP-USM-HMAC-SHA2-MIB . . . . . . . . . . 11 10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 11 11. References . . . . . . . . . . . . . . . . . . . . . . . . . 12 11.1. Normative References . . . . . . . . . . . . . . . . . . 12 11.2. Informative References . . . . . . . . . . . . . . . . . 13 + Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 13 1. Introduction This memo defines a portion of the Management Information Base (MIB) for use with network management protocols. In particular it defines additional authentication protocols for the User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3) specified in RFC 3414 [RFC3414]. In RFC 3414, two different authentication protocols, HMAC-MD5-96 and @@ -308,30 +309,32 @@ 8. Definitions SNMP-USM-HMAC-SHA2-MIB DEFINITIONS ::= BEGIN IMPORTS MODULE-IDENTITY, OBJECT-IDENTITY, snmpModules FROM SNMPv2-SMI -- [RFC2578] snmpAuthProtocols FROM SNMP-FRAMEWORK-MIB; -- [RFC3411] snmpUsmHmacSha2MIB MODULE-IDENTITY - LAST-UPDATED "201501150000Z" -- 25 January 2015, midnight + LAST-UPDATED "201503090000Z" -- 9th Mar 2015, midnight + -- RFC Ed.: replace with publication date & remove this line ORGANIZATION "SNMPv3 Working Group" CONTACT-INFO "WG email: OPSAWG@ietf.org Subscribe: https://www.ietf.org/mailman/listinfo/opsawg Editor: Johannes Merkle secunet Security Networks postal: Mergenthaler Allee 77 D-65760 Eschborn Germany + phone: +49 20154543091 email: johannes.merkle@secunet.com Co-Editor: Manfred Lochter Bundesamt fuer Sicherheit in der Informationstechnik (BSI) postal: Postfach 200363 D-53133 Bonn Germany phone: +49 228 9582 5643 @@ -334,104 +337,110 @@ postal: Postfach 200363 D-53133 Bonn Germany phone: +49 228 9582 5643 email: manfred.lochter@bsi.bund.de" DESCRIPTION "Definitions of Object Identities needed for the use of HMAC-SHA2 by SNMP's User-based Security Model. - Copyright (C) The Internet Society (2015). + Copyright (c) 2014 IETF Trust and the persons identified + as authors of the code. All rights reserved. - This version of this MIB module is part of RFC TBD; - see the RFC itself for full legal notices. - Supplementary information may be available on - http://www.ietf.org/copyrights/ianamib.html." - -- RFC Ed.: replace TBD with actual RFC number & remove this line + Redistribution and use in source and binary forms, with + or without modification, is permitted pursuant to, and + subject to the license terms contained in, the Simplified + BSD License set forth in Section 4.c of the IETF Trust's + Legal Provisions Relating to IETF Documents + (http://trustee.ietf.org/license-info)." - REVISION "201501150000Z" + REVISION "201503090000Z" -- 9th Mar 2015, midnight + -- RFC Ed.: replace with publication date & remove this line DESCRIPTION "Initial version, published as RFC TBD" -- RFC Ed.: replace TBD with actual RFC number & remove this line ::= { snmpModules nn } -- nn to be assigned by IANA -- RFC Ed.: replace nn with actual number assigned by IANA & remove -- this comment usmHMAC128SHA224AuthProtocol OBJECT-IDENTITY STATUS current - DESCRIPTION "The Authentication Protocol usmHMAC128SHA224AuthProtocol - uses HMAC-SHA-224 and truncates output to 128 bits." + DESCRIPTION "The Authentication Protocol + usmHMAC128SHA224AuthProtocol uses HMAC-SHA-224 and + truncates output to 128 bits." REFERENCE "- Krawczyk, H., Bellare, M., and R. Canetti, HMAC: Keyed-Hashing for Message Authentication, RFC 2104. - National Institute of Standards and Technology, Secure Hash Standard (SHS), FIPS PUB 180-4, 2012." ::= { snmpAuthProtocols aa } -- aa to be assigned by IANA -- RFC Ed.: replace aa with actual number assigned by IANA & remove -- this comment usmHMAC192SHA256AuthProtocol OBJECT-IDENTITY STATUS current - DESCRIPTION "The Authentication Protocol usmHMAC192SHA256AuthProtocol - uses HMAC-SHA-256 and truncates output to 192 bits." + DESCRIPTION "The Authentication Protocol + usmHMAC192SHA256AuthProtocol uses HMAC-SHA-256 and + truncates output to 192 bits." REFERENCE "- Krawczyk, H., Bellare, M., and R. Canetti, HMAC: - Keyed-Hashing for Message Authentication, RFC 2104. - National Institute of Standards and Technology, Secure Hash Standard (SHS), FIPS PUB 180-4, 2012." ::= { snmpAuthProtocols bb } -- bb to be assigned by IANA -- RFC Ed.: replace bb with actual number assigned by IANA & remove -- this comment usmHMAC256SHA384AuthProtocol OBJECT-IDENTITY STATUS current - DESCRIPTION "The Authentication Protocol usmHMAC256SHA384AuthProtocol - uses HMAC-SHA-384 and truncates output to 256 bits." + DESCRIPTION "The Authentication Protocol + usmHMAC256SHA384AuthProtocol uses HMAC-SHA-384 and + truncates output to 256 bits." REFERENCE "- Krawczyk, H., Bellare, M., and R. Canetti, HMAC: Keyed-Hashing for Message Authentication, RFC 2104. - National Institute of Standards and Technology, Secure Hash Standard (SHS), FIPS PUB 180-4, 2012." ::= { snmpAuthProtocols cc } -- cc to be assigned by IANA -- RFC Ed.: replace cc with actual number assigned by IANA & remove - this comment + -- this comment -usmHMAC384SHA12AuthProtocol OBJECT-IDENTITY + usmHMAC384SHA512AuthProtocol OBJECT-IDENTITY STATUS current - DESCRIPTION "The Authentication Protocol usmHMAC384SHA512AuthProtocol - uses HMAC-SHA-512 and truncates output to 384 bits." + DESCRIPTION "The Authentication Protocol + usmHMAC384SHA512AuthProtocol uses HMAC-SHA-512 and + truncates output to 384 bits." REFERENCE "- Krawczyk, H., Bellare, M., and R. Canetti, HMAC: Keyed-Hashing for Message Authentication, RFC 2104. - National Institute of Standards and Technology, Secure Hash Standard (SHS), FIPS PUB 180-4, 2012." ::= { snmpAuthProtocols dd } -- dd to be assigned by IANA -- RFC Ed.: replace dd with actual number assigned by IANA & remove - this comment + -- this comment END 9. Security Considerations 9.1. Use of the HMAC-SHA-2 authentication protocols in USM - The security considerations of [RFC3414] also apply to the use of all - the HMAC-SHA-2 authentication protocols in USM. + The security considerations of [RFC3414] also apply to the HMAC-SHA-2 + authentication protocols defined in this document. 9.2. Cryptographic strength of the authentication protocols - At the time of this writing, all of the HMAC-SHA-2 authentication - protocols provide a very high level of security. The security of - each HMAC-SHA-2 authentication protocol depends on the parameters - used in the corresponding HMAC computation, which are the length of - the key (if the key has maximum entropy), the size of the hash - function's internal state, and the length of the truncated MAC. For - the HMAC-SHA-2 authentication protocols these values are as follows - (values are given in bits). + At the time of publication of this document, all of the HMAC-SHA-2 + authentication protocols provide a very high level of security. The + security of each HMAC-SHA-2 authentication protocol depends on the + parameters used in the corresponding HMAC computation, which are the + length of the key (if the key has maximum entropy), the size of the + hash function's internal state, and the length of the truncated MAC. + For the HMAC-SHA-2 authentication protocols these values are as + follows (values are given in bits). +------------------------------+---------+----------------+---------+ | Protocol | Key | Size of | MAC | | | length | internal state | length | +------------------------------+---------+----------------+---------+ | usmHMAC128SHA224AuthProtocol | 224 | 256 | 128 | | usmHMAC192SHA256AuthProtocol | 256 | 256 | 192 | | usmHMAC256SHA384AuthProtocol | 384 | 512 | 256 | | usmHMAC384SHA512AuthProtocol | 512 | 512 | 384 | +------------------------------+---------+----------------+---------+