> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On Behalf Of Dave Shield
> Sent: Thursday, August 16, 2007 2:28 AM

> In which case, Brian has identified the main issue here - the 
> reliance on
> 'time_t' and related API calls to hold and manipulate 
> "time-since-the-Epoch"
> values.
> 
> The status here is similar to that regarding the Y2K issue.
> The Net-SNMP code predominately relies on the underlying O/S
> libraries for most of this processing.   If the O/S is susceptible to
> the 2038 problem, then the Net-SNMP applications will be too.

        I beg to differ.  Unlike many applications, SNMP has always had the 
notion of timecounter rollover and engine reboot.  It should be possible to 
make Net-SNMP as tolerant of the epoch as it can be using only the existing 32 
bit clock.  In fact, I don't see how a 64 bit clock can help the situation, 
other than making 32-bit rollovers a little easier to detect.

        In other words, Net-SNMP may be vulnerable if the OS' 32 bit clock is 
misimplemented, but, since that should pretty much kill the whole system, it's 
nothing to worry about.  Other than that, you should be able to make everything 
work correctly with only a 32 bit clock.

        In any case, the idea that a software system will go 31 years without 
an upgrade...   :-}


Mike

-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >>  http://get.splunk.com/
_______________________________________________
Net-snmp-users mailing list
[email protected]
Please see the following page to unsubscribe or change other options:
https://lists.sourceforge.net/lists/listinfo/net-snmp-users

Reply via email to