- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- SNMP Community Strings - not secure enough?
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-05-2002 01:49 AM
07-05-2002 01:49 AM
SNMP Community Strings - not secure enough?
I need to have SNMP daemon running on my HP servers, so cannot turn it off. I have configured a complex community string in snmpd.conf and set daemon to reply only to our management server's snmp requests (on IP 100.20.30.40 for example).
/etc/SnmpAgent.d/snmpd.conf therefore has these entries:
get-community-name: {complex string} IP: 100.20.30.40 OVhost
set-community-name: {complex string} IP: 100.20.30.40 OVhost
trap-dest: OVhost
From my Openview station (100.20.30.40 - OVhost) I can run..
#snmpwalk -c (complex string) hostname system
..and I get a reply.
This configuration bypasses the default 'public' community string vulnerability, but I have recently found (through a Nessus scan) that my snmp daemon is replying to hosts (other than 100.20.30.40) with a community string of 'snmpd'.
#snmpwalk -c snmpd hostname
Are there further tweaks I can make to the snmp configuration, or am I better using TCP wrappers to address this vulnerability.
Thanks in advance.
Duncan
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-06-2002 02:53 PM
07-06-2002 02:53 PM
Re: SNMP Community Strings - not secure enough?
what you have found is an old SNMP weakness (hardcoded SNMP community strings), which was disclosed to the public the previous year (Sun did it, too).
You'll have to upgrade to the current version...
And for security reasons your only choice is SNMPv3, which encrypts the whole communication...
Just my $0.02,
Wodisch
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-07-2002 05:12 AM
07-07-2002 05:12 AM
Re: SNMP Community Strings - not secure enough?
Some additional security measures you can take:
1) have the network management station (NMS) residing in the same subnet as your managed HP-UX servers behind the firewall and have your firewall filter out all inbound snmp service port 161/162 UDP/TCP traffic. A network-based firewall is ideal, if not a host-based tcpwrapper or netfilter should suffice.
2) run your snmp daemons to run at a different port e.g. UDP 65535. This is a kind of security by obscurity in that sense but helps mitigate some part of the security risk involved with snmp.
3) allow only read-only MIB access via snmp (i.e. snmpget, snmpwalk). For security reasons, don't ever allow a write to the MIB (i.e. snmpset).
4) install your server with the latest snmp-related security patches.
Hope this helps. Regards.
Steven Sim Kok Leong
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-08-2002 06:52 AM
07-08-2002 06:52 AM
Re: SNMP Community Strings - not secure enough?
only the control station to send/recieve SNMP requests.
As already noted restrict SNMP at all your firewalls.
Ipwrappers would be a nice enhancement to SNMP security.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-08-2002 07:00 AM
07-08-2002 07:00 AM
Re: SNMP Community Strings - not secure enough?
Thanks again for your advice
Duncan