11.5. Access to the SNMP-USER-BASED-SM-MIB
11.5. Access to the SNMP-USER-BASED-SM-MIB
This section provides recommendations for controlling access to the objects in the SNMP-USER-BASED-SM-MIB module.
Overview
The SNMP-USER-BASED-SM-MIB contains sensitive security-related information, including:
- User names and security parameters
- Authentication and privacy protocol identifiers
- Mechanisms for changing keys
- Statistical counters
Inappropriate access to these objects could compromise the security of the entire SNMP management system.
Access Control Requirements
Access to the SNMP-USER-BASED-SM-MIB MUST be controlled using the View-based Access Control Model (VACM) [RFC3415] or another access control mechanism of equivalent strength.
Recommended Access Controls
The following access control guidelines are recommended:
1. usmUserTable - User Configuration Table
Read Access:
- Users SHOULD be able to read their own entry in the
usmUserTable - Administrators SHOULD be able to read all entries
- General users SHOULD NOT be able to read other users' entries
Write Access:
- Users SHOULD be able to modify certain objects in their own entry:
usmUserOwnAuthKeyChange- to change their own authentication keyusmUserOwnPrivKeyChange- to change their own privacy keyusmUserPublic- a general-purpose writable object
- Administrators SHOULD be able to:
- Create new users via
usmUserCloneFromandusmUserStatus - Modify
usmUserAuthKeyChangeandusmUserPrivKeyChangefor all users - Delete users by setting
usmUserStatustodestroy(6)
- Create new users via
- General users SHOULD NOT be able to modify other users' entries
2. usmUserSpinLock
- Read Access: All authenticated users
- Write Access: Only administrators or users authorized to modify
usmUserTable
The usmUserSpinLock is used to coordinate access to the usmUserTable when multiple managers attempt simultaneous modifications.
3. usmStats Group - Statistics Counters
Read Access:
- SHOULD be readable by administrators and monitoring applications
- MAY be readable by general authenticated users for diagnostic purposes
Write Access:
- SHOULD NOT be writable by any user (these are read-only counters)
The statistics counters provide valuable information for:
- Security monitoring and intrusion detection
- Troubleshooting authentication and time synchronization issues
- Capacity planning
4. Key Management Objects
The following objects require special protection:
usmUserAuthKeyChangeandusmUserPrivKeyChange: These objects allow administrators to change any user's keys. Access should be strictly limited to trusted administrators.usmUserOwnAuthKeyChangeandusmUserOwnPrivKeyChange: These objects allow users to change their own keys. Each user should have write access to these objects in their own entry only.
Important: These objects use a special key change protocol (described in section 5 of the MIB module) to ensure that keys cannot be intercepted or disclosed during the change operation.
View Configuration Example
A typical VACM configuration might include:
-
Administrator View: Full read-write access to the entire
usmUserTableand read access tousmStats -
User Self-Management View: Read access to own entry in
usmUserTable, write access tousmUserOwnAuthKeyChangeandusmUserOwnPrivKeyChangein own entry -
Monitoring View: Read-only access to
usmStatsgroup for security monitoring -
Restricted View: No access to
usmUserTable, limited or no access tousmStats
Security Considerations for MIB Access
-
Prevent Enumeration: Restricting read access to
usmUserTableprevents attackers from enumerating valid user names. -
Protect Key Change Operations: Even though keys themselves are never directly readable, the key change mechanism should be protected to prevent unauthorized key changes.
-
Monitor Statistics: Regular monitoring of
usmStatscounters can help detect:- Brute-force authentication attempts (
usmStatsWrongDigests) - Time synchronization problems (
usmStatsNotInTimeWindows) - Attempted use of unknown users (
usmStatsUnknownUserNames)
- Brute-force authentication attempts (
-
Audit Log Integration: Consider integrating SNMP security events (derived from
usmStatschanges) into enterprise security information and event management (SIEM) systems.
Initial Configuration
During initial configuration of an SNMP engine:
- At least one initial user with full administrative privileges MUST be configured.
- This initial user should be configured via a secure out-of-band mechanism (e.g., local console access).
- Once the initial user is configured, additional users can be created via SNMP using the
usmUserCloneFrommechanism. - The initial user's credentials should be changed immediately after first use if the default credentials were used during bootstrapping.