Google      
  WWW DocMirror.net

[ RFC4087 | RFC Index | Protocol Standards | Linux Docs | FreeBSD Docs | RFC4089 ]

RFC 4088








Network Working Group                                           D. Black
Request for Comments: 4088                               EMC Corporation
Category: Standards Track                                  K. McCloghrie
                                                           Cisco Systems
                                                        J. Schoenwaelder
                                         International University Bremen
                                                               June 2005


           Uniform Resource Identifier (URI) Scheme for the
               Simple Network Management Protocol (SNMP)

Status of This Memo

   This document specifies an Internet standards track protocol for the
   Internet community, and requests discussion and suggestions for
   improvements.  Please refer to the current edition of the "Internet
   Official Protocol Standards" (STD 1) for the standardization state
   and status of this protocol.  Distribution of this memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2005).

Abstract

   The Simple Network Management Protocol (SNMP) and the Internet
   Standard Management Framework are widely used for the management of
   communication devices, creating a need to specify SNMP access
   (including access to SNMP MIB object instances) from non-SNMP
   management environments.  For example, when out-of-band IP management
   is used via a separate management interface (e.g., for a device that
   does not support in-band IP access), a uniform way to indicate how to
   contact the device for management is needed.  Uniform Resource
   Identifiers (URIs) fit this need well, as they allow a single text
   string to indicate a management access communication endpoint for a
   wide variety of IP-based protocols.

   This document defines a URI scheme so that SNMP can be designated as
   the protocol used for management.  The scheme also allows a URI to
   designate one or more MIB object instances.










Black, et al.               Standards Track                     [Page 1]


RFC 4088                  URI Scheme for SNMP                  June 2005


Table of Contents

   1. Introduction..................................................  2
   2. Usage.........................................................  3
   3. Syntax of an SNMP URI.........................................  4
      3.1. Relative Reference Considerations........................  5
   4. Semantics and Operations......................................  6
      4.1. SNMP Service URIs........................................  6
      4.2. SNMP Object URIs.........................................  7
           4.2.1. SNMP Object URI Data Access.......................  8
      4.3. OID Groups in SNMP URIs.................................. 10
      4.4. Interoperability Considerations.......................... 10
   5. Examples...................................................... 11
   6. Security Considerations....................................... 12
      6.1. SNMP URI to SNMP Gateway Security Considerations......... 13
   7. IANA Considerations........................................... 14
   8. Normative References.......................................... 14
   9. Informative References........................................ 15
   10. Acknowledgements............................................. 16
   Appendix A. Registration Template................................ 17

1.  Introduction

   SNMP and the Internet-Standard Management Framework were originally
   devised to manage IP devices via in-band means, in which management
   access is primarily via the same interface(s) used to send and
   receive IP traffic.  SNMP's wide adoption has resulted in its use for
   managing communication devices that do not support in-band IP access
   (e.g., Fibre Channel devices); a separate out-of-band IP interface is
   often used for management.  URIs provide a convenient way to locate
   that interface and specify the protocol to be used for management;
   one possible scenario is for an in-band query to return a URI that
   indicates how the device is managed.  This document specifies a URI
   scheme to permit SNMP (including a specific SNMP context) to be
   designated as the management protocol by such a URI.  This scheme
   also allows a URI to refer to specific object instances within an
   SNMP MIB.

   For a detailed overview of the documents that describe the current
   Internet-Standard Management Framework, please refer to Section 7 of
   [RFC3410].

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].






Black, et al.               Standards Track                     [Page 2]


RFC 4088                  URI Scheme for SNMP                  June 2005


2.  Usage

   There are two major classes of SNMP URI usage: configuration and
   gateways between SNMP and other protocols that use SNMP URIs.

   An SNMP URI used for configuration indicates the location of
   management information as part of the configuration of an application
   containing an SNMP manager.  The URI can be obtained from a
   configuration file or may be provided by a managed device (see
   Section 1 for an example).  Management information is exchanged
   between the SNMP manager and agent, but it does not flow beyond the
   manager, as shown in the following diagram:

                               ***********  SNMP-Request   *********
                               *         *================>*       *
                URI ---------->* Manager *                 * Agent *
                               *         *<================*       *
                               ***********  SNMP-Response  *********
                                    ^
                                    |
      Other Config Info ------------+

   Additional configuration information (e.g., a security secret or key)
   may be provided via an interface other than that used for the URI.
   For example, when a managed device provides an SNMP URI in an
   unprotected fashion, that device should not provide a secret or key
   required to use the URI.  The secret or key should instead be pre-
   configured in or pre-authorized to the manager; see Section 6.

   For gateway usage, clients employ SNMP URIs to request management
   information via an SNMP URI to SNMP gateway (also called an SNMP
   gateway in this document).  The SNMP manager within the SNMP gateway
   accesses the management information and returns it to the requesting
   client, as shown in the following diagram:

                                SNMP gateway
           **********     URI    ***********  SNMP-Request   *********
           *        *===========>*         *================>*       *
           * Client *            * Manager *                 * Agent *
           *        *<===========*         *<================*       *
           **********    Info    ***********  SNMP-Response  *********
                                    ^
                                    |
      Other Config Info ------------+

   Additional configuration information (e.g., security secrets or keys)
   may be provided via an interface other than that used for the URI.
   For example, some types of security information, including secrets



Black, et al.               Standards Track                     [Page 3]


RFC 4088                  URI Scheme for SNMP                  June 2005


   and keys, should be pre-configured in or pre-authorized to the
   manager rather than be provided by the client; see Section 6.

3.  Syntax of an SNMP URI

   An SNMP URI has the following ABNF [RFC2234] syntax, based on the
   ABNF syntax rules for userinfo, host, port, and (path) segment in
   [RFC3986] and the ABNF syntax rule for HEXDIG in [RFC2234]:

      snmp-uri        = "snmp://" snmp-authority [ context [ oids ]]

      snmp-authority  = [ securityName "@" ] host [ ":" port ]
      securityName    = userinfo    ; SNMP securityName

      context         = "/" contextName [ ";" contextEngineID ]
      contextName     = segment     ; SNMP contextName
      contextEngineID = 1*(HEXDIG HEXDIG)    ; SNMP contextEngineID

      oids            = "/" ( oid / oid-group ) [ suffix ]
      oid-group       = "(" oid *( "," oid ) ")"
      oid             = < as specified by [RFC 3061] >
      suffix          = "+" / ".*"

   The userinfo and (path) segment ABNF rules are reused for syntax
   only.  In contrast, host and port have both the syntax and semantics
   specified in [RFC3986].  See [RFC3411] for the semantics of
   securityName, contextEngineID, and contextName.

   The snmp-authority syntax matches the URI authority syntax in Section
   3.2 of [RFC3986], with the additional restriction that the userinfo
   component of an authority (when present) MUST be an SNMP
   securityName.  If the securityName is empty or not given, the entity
   making use of an SNMP URI is expected to know what SNMP securityName
   to use if one is required.  Inclusion of authentication information
   (e.g., passwords) in URIs has been deprecated (see Section 3.2.1 of
   [RFC3986]), so any secret or key required for SNMP access must be
   provided via other means that may be out-of-band with respect to
   communication of the URI.  If the port is empty or not given, port
   161 is assumed.

   If the contextName is empty or not given, the zero-length string ("")
   is assumed, as it is the default SNMP context.  An SNMP
   contextEngineID is a variable-format binary element that is usually
   discovered by an SNMP manager.  An SNMP URI encodes a contextEngineID
   as hexadecimal digits corresponding to a sequence of bytes.  If the
   contextEngineID is empty or not given, the context engine is to be
   discovered by querying the SNMP agent at the specified host and port;
   see Section 4.1 below.  The contextEngineID component of the URI



Black, et al.               Standards Track                     [Page 4]


RFC 4088                  URI Scheme for SNMP                  June 2005


   SHOULD be present if more than one context engine at the designated
   host and port supports the designated context.

   An SNMP URI that designates the default SNMP context ("") MAY end
   with the "/" character that introduces the contextName component.  An
   SNMP URI MUST NOT end with the "/" character that introduces an oid
   or oid-group component, as the empty string is not a valid OID for
   SNMP.

   The encoding rules specified in [RFC3986] MUST be used for SNMP URIs,
   including the use of percent encoding ("%" followed by two hex
   digits) as needed to represent characters defined as reserved in
   [RFC3986] and any characters not allowed in a URI.  SNMP permits any
   UTF-8 character to be used in a securityName or contextName; all
   multi-byte UTF-8 characters in an SNMP URI MUST be percent encoded as
   specified in Sections 2.1 and 2.5 of [RFC3986].  These requirements
   are a consequence of reusing the ABNF syntax rules for userinfo and
   segment from [RFC3986].

   SNMP URIs will generally be short enough to avoid implementation
   string-length limits (e.g., that may occur at 255 characters).  Such
   limits may be a concern for large OID groups; relative references to
   URIs (see Section 4.2 of [RFC3986]) may provide an alternative in
   some circumstances.

   Use of IP addresses in SNMP URIs is acceptable in situations where
   dependence on availability of DNS service is undesirable or must be
   avoided; otherwise, IP addresses should not be used (see [RFC1900]
   for further explanation).

3.1.  Relative Reference Considerations

   Use of the SNMP default context (zero-length string) within an SNMP
   URI can result in a second instance of "//" in the URI, such as the
   following:

      snmp://<host>//<oid>

   This is allowed by [RFC3986] syntax; if a URI parser does not handle
   the second "//" correctly, the parser is broken and needs to be
   fixed.  This example is important because use of the SNMP default
   context in SNMP URIs is expected to be common.

   On the other hand, the second occurrence of "//" in an absolute SNMP
   URI affects usage of relative references to that URI (see Section 4.2
   of [RFC3986]) because a "//" at the start of a relative reference
   always introduces a URI authority component (host plus optional
   userinfo and/or port; see [RFC3986]).  Specifically, a relative



Black, et al.               Standards Track                     [Page 5]


RFC 4088                  URI Scheme for SNMP                  June 2005


   reference of the form //<oid2> will not work, because the "//" will
   cause <oid2> to be parsed as a URI authority, resulting in a syntax
   error when the parser fails to find a host in <oid2> .  To avoid this
   problem, relative references that start with "//" but do not contain
   a URI authority component MUST NOT be used.  Functionality equivalent
   to any such forbidden relative reference can be obtained by prefixing
   "." or ".." to the forbidden relative reference (e.g., ..//<oid2>).
   The prefix to use depends on the base URI.

4.  Semantics and Operations

   An SNMP URI that does not include any OIDs is called an SNMP service
   URI because it designates a communication endpoint for access to SNMP
   management service.  An SNMP URI that includes one or more OIDs is
   called an SNMP object URI because it designates one or more object
   instances in an SNMP MIB.  The expected means of using an SNMP URI is
   to employ an SNMP manager to access the SNMP context designated by
   the URI via the SNMP agent at the host and port designated by the
   URI.

4.1.  SNMP Service URIs

   An SNMP service URI does not designate a data object, but rather an
   SNMP context to be accessed by a service; the telnet URI scheme
   [RFC1738] is another example of URIs that designate service access.
   If the contextName in the URI is empty or not given, "" (the zero-
   length string) is assumed, as it is the default SNMP context.

   If a contextEngineID is given in an SNMP service URI, the context
   engine that it designates is to be used.  If the contextEngineID is
   empty or not given in the URI, the context engine is to be
   discovered; the context engine to be used is the one that supports
   the context designated by the URI.  The contextEngineID component of
   the URI SHOULD be present if more than one context engine at the
   designated host and port supports the designated context.

   Many common uses of SNMP URIs are expected to omit (i.e., default)
   the contextEngineID because they do not involve SNMP proxy agents,
   which are the most common reason for multiple SNMP context engines to
   exist at a single host and port.  Specifically, when an SNMP agent is
   local to the network interface that it manages, the agent will
   usually have only one context engine, in which case it is safe to
   omit the contextEngineID component of an SNMP URI.  In addition, many
   SNMP agents that are local to a network interface support only the
   default SNMP context (zero-length string).






Black, et al.               Standards Track                     [Page 6]


RFC 4088                  URI Scheme for SNMP                  June 2005


4.2.  SNMP Object URIs

   An SNMP object URI contains one or more OIDs.  The URI is used by
   first separating the OID or OID group (including its preceding slash
   plus any parentheses and suffix) and then processing the resulting
   SNMP service URI as specified in Section 4.1 (above) to determine the
   SNMP context to be accessed.  The OID or OID group is then used to
   generate SNMP operations directed to that SNMP context.

   The semantics of an SNMP object URI depend on whether the OID or OID
   group has a suffix and what that suffix is.  There are three possible
   formats; in each case, the MIB object instances are designated within
   the SNMP context specified by the service URI portion of the SNMP
   object URI.  The semantics of an SNMP object URI that contains a
   single OID are as follows:

      (1) An OID without a suffix designates the MIB object instance
          named by the OID.

      (2) An OID with a "+" suffix designates the lexically next MIB
          object instance following the OID.

      (3) An OID with a ".*" suffix designates the set of MIB object
          instances for which the OID is a strict lexical prefix; this
          does not include the MIB object instance named by the OID.

   An OID group in an SNMP URI consists of a set of OIDs in parentheses.
   In each case, the OID group semantics are the extension of the single
   OID semantics to each OID in the group (e.g., a URI with a "+" suffix
   designates the set of MIB object instances consisting of the
   lexically next instance for each OID in the OID group).

   When there is a choice among URI formats to designate the same MIB
   object instance or instances, the above list is in order of
   preference (no suffix is most preferable), as it runs from most
   precise to least precise.  This is because an OID without a suffix
   precisely designates an object instance, whereas a "+" suffix
   designates the next object instance, which may change, and the ".*"
   suffix could designate multiple object instances.  Multiple
   syntactically distinct SNMP URIs SHOULD NOT be used to designate the
   same MIB object instance or set of instances, as this may cause
   unexpected results in URI-based systems that use string comparison to
   test URIs for equality.

   SNMP object URIs designate the data to be accessed, as opposed to the
   specific SNMP operations to be used for access; Section 4.2.1
   provides examples of how SNMP operations can be used to access data
   for SNMP object URIs.  Nonetheless, any applicable SNMP operation,



Black, et al.               Standards Track                     [Page 7]


RFC 4088                  URI Scheme for SNMP                  June 2005


   including GetBulk, MAY be used to access data for all or part of one
   or more SNMP object URIs (e.g., via use of multiple variable bindings
   in a single operation); it is not necessary to use the specific
   operations described in Section 4.2.1 as long as the results
   (returned variable bindings or error) could have been obtained by
   following Section 4.2.1's descriptions.  The use of relative
   references that do not change the contextName (i.e., ./<oid>) should
   be viewed as a hint that optimization of SNMP access across multiple
   SNMP URIs may be possible.

   An SNMP object URI MAY also be used to specify a MIB object instance
   or instances to be written; this causes generation of an SNMP Set
   operation instead of a Get.  The "+" and ".*" suffixes MUST NOT be
   used in this case; any attempt to do so is an error that MUST NOT
   generate any SNMP Set operations.  Values to be written to the MIB
   object instance or instances are not specified within an SNMP object
   URI.

   SNMP object URIs designate data in SNMP MIBs and hence do not provide
   the means to generate all possible SNMP protocol operations.  For
   example, data access for an SNMP object URI cannot directly generate
   either Snmpv2-Trap or InformRequest notifications, although side
   effects of data access could cause such notifications (depending on
   the MIB).  In addition, whether and how GetBulk is used for an SNMP
   object URI with a ".*" suffix is implementation specific.

4.2.1.  SNMP Object URI Data Access

   Data access based on an SNMP object URI returns an SNMP variable
   binding for each MIB object instance designated by the URI, or an
   SNMP error if the operation fails.  An SNMP variable binding binds a
   variable name (OID) to a value or an SNMP exception (see [RFC3416]).
   The SNMP operation or operations needed to access data designated by
   an SNMP object URI depend on the OID or OID group suffix or absence
   thereof.  The following descriptions are not the only method of
   performing data access for an SNMP object URI; any suitable SNMP
   operations may be used as long as the results (returned variable
   bindings or error) are functionally equivalent.

      (1) For an OID or OID group without a suffix, an SNMP Get
          operation is generated using each OID as a variable binding
          name.  If an SNMP error occurs, that error is the result of
          URI data access; otherwise, the returned variable binding or
          bindings are the result of URI data access.  Note that any
          returned variable binding may contain an SNMP "noSuchObject"
          or "noSuchInstance" exception.





Black, et al.               Standards Track                     [Page 8]


RFC 4088                  URI Scheme for SNMP                  June 2005


      (2) For an OID or OID group with a "+" suffix, an SNMP GetNext
          operation is generated using each OID as a variable binding
          name.  If an SNMP error occurs, that error is the result of
          URI data access; otherwise, the returned variable binding or
          bindings are the result of URI data access.  Note that any
          returned variable binding may contain an SNMP "endOfMibView"
          exception.

      (3) For an OID or OID group with a ".*" suffix, an SNMP GetNext
          operation is initially generated using each OID as a variable
          binding name.  If the result is an SNMP error, that error is
          the result of URI data access.  If all returned variable
          bindings contain either a) an OID for which the corresponding
          URI OID is not a lexical prefix or b) an SNMP "endOfMibView"
          exception, then the returned variable bindings are the result
          of URI data access.

          Otherwise, the results of the GetNext operation are saved, and
          another SNMP GetNext operation is generated using the newly
          returned OIDs as variable binding names.  This is repeated
          (save the results and generate a GetNext with newly returned
          OIDs as variable binding names) until all the returned
          variable bindings from a GetNext contain either a) an OID for
          which the corresponding URI OID is not a lexical prefix or b)
          an SNMP "endOfMibView" exception.  The results from all of the
          GetNext operations are combined to become the overall result
          of URI data access; this may include variable bindings whose
          OID is not a lexical extension of the corresponding URI OID.
          If the OID subtrees (set of OIDs for which a specific URI OID
          is a lexical prefix) are not the same size for all OIDs in the
          OID group, the largest subtree determines when this iteration
          ends.  SNMP GetBulk operations MAY be used to optimize this
          iterated access.

          Whenever a returned variable binding contains an OID for which
          the corresponding URI OID is not a lexical prefix or an SNMP
          "endOfMibView" exception, iteration of that element of the OID
          group MAY cease, reducing the number of variable bindings used
          in subsequent GetNext operations.  In this case, the results
          of URI data access for the SNMP URI will not consist entirely
          of OID-group-sized sets of variable bindings.  Even if this
          does not occur, the last variable binding returned for each
          member of the OID group will generally contain an SNMP
          "endOfMibView" exception or an OID for which the corresponding
          URI OID is not a lexical prefix.






Black, et al.               Standards Track                     [Page 9]


RFC 4088                  URI Scheme for SNMP                  June 2005


4.3.  OID Groups in SNMP URIs

   Parenthesized OID groups in SNMP URIs are intended to support MIB
   object instances for which access via a single SNMP operation is
   required to ensure consistent results.  Therefore, the OIDs within an
   OID group in an SNMP URI SHOULD be accessed by a single SNMP
   operation containing a variable binding corresponding to each OID in
   the group.  A specific example involves the InetAddress and
   InetAddressType textual conventions defined in [RFC4001], for which
   the format of an InetAddress instance is specified by an associated
   InetAddressType instance.  If two such associated instances are read
   via separate SNMP operations, the resulting values could be
   inconsistent (e.g., due to an intervening Set), causing the
   InetAddress value to be interpreted incorrectly.

   This single operation requirement ("SHOULD") also applies to each OID
   group resulting from iterated access for an SNMP URI with a ".*"
   suffix.  When members of an SNMP URI OID group differ in the number
   of OIDs for which each is a lexical prefix, this iteration may
   overrun by returning numerous variable bindings for which the
   corresponding OID in the OID group is not a lexical prefix.  Such
   overrun can be avoided by using relative references within the same
   context (i.e., ./<oid>.* ) when it is not important to access
   multiple MIB object instances in a single SNMP operation.

4.4.  Interoperability Considerations

   This document defines a transport-independent "snmp" scheme that is
   intended to accommodate SNMP transports other than UDP.  UDP is the
   default transport for access to information specified by an SNMP URI
   for backward compatibility with existing usage, but other transports
   MAY be used.  If more than one transport can be used (e.g., SNMP over
   TCP [RFC3430] in addition to SNMP over UDP), the information or SNMP
   service access designated by an SNMP URI SHOULD NOT depend on which
   transport is used (for SNMP over TCP, this is implied by Section 2 of
   [RFC3430]).

   An SNMP URI designates use of SNMPv3 as specified by [RFC3416],
   [RFC3417], and related documents, but older versions of SNMP MAY be
   used in accordance with [RFC3584] when usage of such older versions
   is unavoidable.  For SNMPv1 and SNMPv2c, the securityName,
   contextName, and contextEngineID elements of an SNMP URI are mapped
   to/from the community name, as described in [RFC3584].  When the
   community name is kept secret as a weak form of authentication, this
   mapping should be configured so that these three elements do not
   reveal information about the community name.  If this is not done,
   then any SNMP URI component that would disclose significant
   information about a secret community name SHOULD be omitted.  Note



Black, et al.               Standards Track                    [Page 10]


RFC 4088                  URI Scheme for SNMP                  June 2005


   that some community names contain reserved characters (e.g., "@")
   that require percent encoding when they are used in an SNMP URI.
   SNMP versions (e.g., v3) have been omitted from the SNMP URI scheme
   to permit use of older versions of SNMP, as well as any possible
   future successor to SNMPv3.

5.  Examples

      snmp://example.com

   This example designates the default SNMP context at the SNMP agent at
   port 161 of host example.com .

      snmp://tester5@example.com:8161

   This example designates the default SNMP context at the SNMP agent at
   port 8161 of host example.com and indicates that the SNMP
   securityName "tester5" is to be used to access that agent.  A
   possible reason to use a non-standard port is for testing a new
   version of SNMP agent code.

      snmp://example.com/bridge1

   This example designates the "bridge1" SNMP context at example.com.
   Because the contextEngineID component of the URI is omitted, there
   SHOULD be at most one SNMP context engine at example.com that
   supports the "bridge1" context.

      snmp://example.com/bridge1;800002b804616263

   This example designates the "bridge1" context at snmp.example.com via
   the SNMP context engine 800002b804616263 (string representation of a
   hexadecimal value).  This avoids ambiguity if any other context
   engine supports a "bridge1" context.  The above two examples are
   based on the figure in Section 3.3 of [RFC3411].

      snmp://example.com//1.3.6.1.2.1.1.3.0
      snmp://example.com//1.3.6.1.2.1.1.3+
      snmp://example.com//1.3.6.1.2.1.1.3.*

   These three examples all designate the sysUpTime.0 object instance in
   the SNMPv2-MIB or RFC1213-MIB for the default SNMP context ("") at
   example.com as sysUpTime.0 is:

      a) designated directly by OID 1.3.6.1.2.1.1.3.0,

      b) the lexically next MIB object instance after the OID
         1.3.6.1.2.1.1.3, and



Black, et al.               Standards Track                    [Page 11]


RFC 4088                  URI Scheme for SNMP                  June 2005


      c) the only MIB object instance whose OID has 1.3.6.1.2.1.1.3 as a
         lexical prefix.

   These three examples are provided for illustrative purposes only, as
   multiple syntactically distinct URIs SHOULD NOT be used to designate
   the same MIB object instance, in order to avoid unexpected results in
   URI-based systems that use string comparison to test URIs for
   equality.

      snmp://example.com/bridge1/1.3.6.1.2.1.2.2.1.8.*

   This example designates the ifOperStatus column of the IF-MIB in the
   bridge1 SNMP context at example.com.

      snmp://example.com//(1.3.6.1.2.1.2.2.1.7,1.3.6.1.2.1.2.2.1.8).*

   This example designates all (ifAdminStatus, ifOperStatus) pairs in
   the IF-MIB in the default SNMP context at example.com.

6.  Security Considerations

   An intended use of this URI scheme is designation of the location of
   management access to communication devices.  Such location
   information may be considered sensitive in some environments, making
   it important to control access to this information and possibly even
   to encrypt it when it is sent over the network.  All uses of this URI
   scheme should provide security mechanisms appropriate to the
   environments in which such uses are likely to be deployed.

   The SNMP architecture includes control of access to management
   information (see Section 4.3 of [RFC3411]).  An SNMP URI does not
   contain sufficient security information to obtain access in all
   situations, as the SNMP URI syntax is incapable of encoding SNMP
   securityModels, SNMP securityLevels, and credential or keying
   information for SNMP securityNames.  Other means are necessary to
   provide such information; one possibility is out-of-band pre-
   configuration of the SNMP manager, as shown in the diagrams in
   Section 2.

   By itself, the presence of a securityName in an SNMP URI does not
   authorize use of that securityName to access management information.
   Instead, the SNMP manager SHOULD match the securityName in the URI to
   an SNMP securityName and associated security information that have
   been pre-configured for use by the manager.  If an SNMP URI contains
   a securityName that the SNMP manager is not provisioned to use, SNMP
   operations for that URI SHOULD NOT be generated.





Black, et al.               Standards Track                    [Page 12]


RFC 4088                  URI Scheme for SNMP                  June 2005


   SNMP versions prior to SNMPv3 did not include adequate security.
   Even if the network itself is secure (for example, via use of IPsec),
   there is no control over who on the secure network is allowed to
   access and GET/SET (read/change/create/delete) the objects in MIB
   modules.  It is RECOMMENDED that implementers consider the security
   features provided by the SNMPv3 framework (see [RFC3410], Section 8,
   for an overview), including full support for SNMPv3 cryptographic
   mechanisms (for authentication and privacy).  This is of additional
   importance for MIB elements considered sensitive or vulnerable
   because GETs have side effects.

   Further, deployment of SNMP versions prior to SNMPv3 is NOT
   RECOMMENDED.  Instead, it is RECOMMENDED to deploy SNMPv3 and to
   enable cryptographic security.  It is then a customer/operator
   responsibility to ensure that the SNMP entity giving access to a MIB
   module instance is properly configured to give access to the objects
   only to those principals (users) that have legitimate rights to
   indeed GET or SET (read/change/create/delete) them.

6.1.  SNMP URI to SNMP Gateway Security Considerations

   Additional security considerations apply to SNMP gateways that
   generate SNMP operations for SNMP URIs and return the results to
   clients (see Section 2) because management information is
   communicated beyond the SNMP framework.  In general, an SNMP gateway
   should have some knowledge of the structure and function of the
   management information that it accesses via SNMP.  Among other
   benefits, this allows an SNMP gateway to avoid SNMP access control
   failures because the gateway can reject an SNMP URI that will cause
   such failures before generating any SNMP operations.

   SNMP gateways SHOULD impose authorization or access-control checks on
   all clients.  If an SNMP gateway does not impose authorization or
   access controls, the gateway MUST NOT automatically obtain or use
   SNMP authentication material for arbitrary securityNames, as doing so
   would defeat SNMP's access controls.  Instead, all SNMP gateways
   SHOULD authenticate each client and check the client's authorization
   to use a securityName in an SNMP URI before using the securityName on
   behalf of that client.

   An SNMP gateway is also responsible for ensuring that all of its
   communication is appropriately secured.  Specifically, an SNMP
   gateway SHOULD ensure that communication of management information
   with any client is protected to at least the SNMP securityLevel used
   for the corresponding SNMP access (see Section 3.4.3 of [RFC3411] for
   more information on securityLevel).  If the client provides SNMP
   security information, the SNMP gateway SHOULD authenticate the client
   and SHOULD ensure that an authenticated cryptographic integrity check



Black, et al.               Standards Track                    [Page 13]


RFC 4088                  URI Scheme for SNMP                  June 2005


   is used for that communication to prevent modification of the
   security information.  In addition, if a client provides any key or
   secret, the SNMP gateway SHOULD ensure that encryption is used in
   addition to the integrity check for that communication to prevent
   disclosure of keys or secrets.

   There are management objects defined in SNMP MIBs whose MAX-ACCESS is
   read-write and/or read-create.  Such objects may be considered
   sensitive or vulnerable in some network environments.  SNMP gateway
   support for SNMP SET operations in a non-secure environment without
   proper protection can have a negative effect on network operations.
   The individual MIB module specifications, and especially their
   security considerations, should be consulted for further information.

   Some readable objects in some MIB modules (i.e., objects with a MAX-
   ACCESS other than not-accessible) may be considered sensitive or
   vulnerable in some network environments.  It is thus important to
   control even GET access to these objects via an SNMP gateway and
   possibly to even encrypt the values of these objects when they are
   sent over the network.  The individual MIB module specifications, and
   especially their security considerations, should be consulted for
   further information.  This consideration also applies to objects for
   which read operations have side effects.

7.  IANA Considerations

   The IANA has registered the URL registration template found in
   Appendix A in accordance with [RFC2717].

8.  Normative References

   [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
             Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC2234] Crocker, D. and P. Overell, "Augmented BNF for Syntax
             Specifications: ABNF", RFC 2234, November 1997.

   [RFC3061] Mealling, M., "A URN Namespace of Object Identifiers", RFC
             3061, February 2001.

   [RFC3411] Harrington, D., Presuhn, R., and B. Wijnen, "An
             Architecture for Describing Simple Network Management
             Protocol (SNMP) Management Frameworks", STD 62, RFC 3411,
             December 2002.

   [RFC3416] Presuhn, R., "Version 2 of the Protocol Operations for the
             Simple Network Management Protocol (SNMP)", STD 62, RFC
             3416, December 2002.



Black, et al.               Standards Track                    [Page 14]


RFC 4088                  URI Scheme for SNMP                  June 2005


   [RFC3417] Presuhn, R., "Transport Mappings for the Simple Network
             Management Protocol (SNMP)", STD 62, RFC 3417, December
             2002.

   [RFC3584] Frye, R., Levi, D., Routhier, S., and B. Wijnen,
             "Coexistence between Version 1, Version 2, and Version 3 of
             the Internet-standard Network Management Framework", BCP
             74, RFC 3584, August 2003.

   [RFC3986] Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform
             Resource Identifier (URI): Generic Syntax", STD 66, RFC
             3986, January 2005.

9.  Informative References

   [RFC1738] Berners-Lee, T., Masinter, L., and M. McCahill, "Uniform
             Resource Locators (URL)", RFC 1738, December 1994.

   [RFC1900] Carpenter, B. and Y. Rekhter, "Renumbering Needs Work", RFC
             1900, February 1996.

   [RFC2717] Petke, R. and I. King, "Registration Procedures for URL
             Scheme Names", BCP 35, RFC 2717, November 1999.

   [RFC3410] Case, J., Mundy, R., Partain, D., and B. Stewart,
             "Introduction and Applicability Statements for Internet-
             Standard Management Framework", RFC 3410, December 2002.

   [RFC3430] Schoenwaelder, J., "Simple Network Management Protocol Over
             Transmission Control Protocol Transport Mapping", RFC 3430,
             December 2002.

   [RFC3617] Lear, E., "Uniform Resource Identifier (URI) Scheme and
             Applicability Statement for the Trivial File Transfer
             Protocol (TFTP)", RFC 3617, October 2003.

   [RFC4001] Daniele, M., Haberman, B., Routhier, S., and J.
             Schoenwaelder, "Textual Conventions for Internet Network
             Addresses", RFC 4001, February 2005.












Black, et al.               Standards Track                    [Page 15]


RFC 4088                  URI Scheme for SNMP                  June 2005


10.  Acknowledgements

   Portions of this document were adapted from Eliot Lear's TFTP URI
   scheme specification [RFC3617].  Portions of the security
   considerations were adapted from the widely used security
   considerations "boilerplate" for MIB modules.  Comments from Ted
   Hardie, Michael Mealing, Larry Masinter, Frank Strauss, Bert Wijnen,
   Steve Bellovin, the mreview@ops.ietf.org mailing list and the
   uri@w3c.org mailing list on earlier versions of this document have
   resulted in significant improvements and are gratefully acknowledged.









































Black, et al.               Standards Track                    [Page 16]


RFC 4088                  URI Scheme for SNMP                  June 2005


Appendix A.  Registration Template

   URL scheme name: snmp
   URL scheme syntax: Section 3
   Character encoding considerations: Section 3
   Intended usage: Sections 1 and 2
   Applications and/or protocols which use this scheme: SNMP, all
      versions, see [RFC3410] and [RFC3584].  Also SNMP over TCP,
      see [RFC3430].
   Interoperability considerations: Section 4.4
   Security considerations: Section 6
   Relevant publications: See [RFC3410] for list.  Also [RFC3430]
      and [RFC3584].
   Contact: David L. Black, see below
   Author/Change Controller: IESG

Authors' Addresses

   David L. Black
   EMC Corporation
   176 South Street
   Hopkinton, MA 01748

   Phone: +1 (508) 293-7953
   EMail: black_david@emc.com


   Keith McCloghrie
   Cisco Systems, Inc.
   170 West Tasman Drive
   San Jose, CA USA 95134

   Phone: +1 (408) 526-5260
   EMail: kzm@cisco.com


   Juergen Schoenwaelder
   International University Bremen
   P.O. Box 750 561
   28725 Bremen
   Germany

   Phone: +49 421 200 3587
   EMail: j.schoenwaelder@iu-bremen.de







Black, et al.               Standards Track                    [Page 17]


RFC 4088                  URI Scheme for SNMP                  June 2005


Full Copyright Statement

   Copyright (C) The Internet Society (2005).

   This document is subject to the rights, licenses and restrictions
   contained in BCP 78, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at ietf-
   ipr@ietf.org.

Acknowledgement

   Funding for the RFC Editor function is currently provided by the
   Internet Society.







Black, et al.               Standards Track                    [Page 18]


Hosting by: Hurra Communications Ltd.
Generated: 2007-01-26 17:59:53