In this paper, we show that adoption of the SNMPv3 network management protocol standard offers a unique -- but likely unintended -- opportunity for remotely fingerprinting network infrastructure in the wild. Specifically, by sending unsolicited and unauthenticated SNMPv3 requests, we obtain detailed information about the configuration and status of network devices including vendor, uptime, and the number of restarts. More importantly, the reply contains a persistent and strong identifier that allows for lightweight Internet-scale alias resolution and dual-stack association. By launching active Internet-wide SNMPv3 scan campaigns, we show that our technique can fingerprint more than 4.6 million devices of which around 350k are network routers. Not only is our technique lightweight and accurate, it is complementary to existing alias resolution, dual-stack inference, and device fingerprinting approaches. Our analysis not only provides fresh insights into the router deployment strategies of network operators worldwide, but also highlights potential vulnerabilities of SNMPv3 as currently deployed.
翻译:在本文中,我们表明,采用SNMPv3网络管理协议标准为野外远程指纹网络基础设施提供了一个独特的 -- -- 但可能是无意的 -- -- 机会。具体地说,我们通过发送未经请求和未经认证的SNMPv3请求,获得了关于网络设备配置和状况的详细资料,包括供应商、停机时间和重新启动次数。更重要的是,答复包含一个持久而有力的识别码,允许轻量因特网化别名分辨率和双层连接。通过在互联网上开展积极的SNMPv3扫描运动,我们表明我们的技术可以对460多万个设备进行指纹识别,其中大约350公里是网络路由器。我们的技术光量和准确性不仅补充了现有的别类分辨率、双堆推断和设备指纹方法。我们的分析不仅对全世界网络运营商的路由器部署战略提供了新的洞察力,而且突出了目前部署的SNMPv3的潜在脆弱性。