Solved

SNMP v3 Encryption of encoded messages

Posted on 2016-10-13
3
31 Views
Last Modified: 2016-11-03
I need to research whether any devices that use SNMPv3 perform 3 steps:
1. encode SNMP messages to get an encoded message
2. encrypt the encoded message from step 1 to get the encrypted message
3. encode the encrypted message from step 2.

Thoughts?
0
Comment
Question by:cyber-33
  • 2
3 Comments
 
LVL 78

Expert Comment

by:David Johnson, CD, MVP
ID: 41842915
only if authPriv is enabled and configured (you should use AES and not DES)
0
 

Author Comment

by:cyber-33
ID: 41848904
Interesting. David, why use AES and not DES?

Another question I have what is the scenario, where the encrpted message (encryptedPDU) would represent the encoded message, as opposed to representing plain data (scopedPDU) ?

My concern is that the plain data is being encrypted PRIOR to it is encoded into the SNMP message format.... In other words, step 2 provided in the question is performed before step 1....

Thank you for your help.
0
 
LVL 78

Accepted Solution

by:
David Johnson, CD, MVP earned 500 total points
ID: 41849322
DES has been considered vulnerable for a long time because the time required to crack an encryption algorithm is directly related to the length of the key used to secure the communication. AES allows you to choose a 128-bit, 192-bit or 256-bit key, making it exponentially stronger than the 56-bit key of DES.
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
Exchange server is not supported in any cloud-hosted platform (other than Azure with Azure Premium Storage).
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now