> I've tried building a small agent for MIPS with net-snmp 5.1.4 and
> it worked like a breeze for me. In fact, I had problems with 5.4.x
> versions, and they were larger agents anyway. I needed net-snmp for
> v2 trap generation only, and I was able to reduce the snmpd + all
> the required .so
I've followed the advise in the FAQ about making Net-SNMP smaller but
I'm looking to go to the next level. I've got a v2c, v3 system running
but for a new project, all I really need is v2.
I'm working with Net-SNMP v5.2.2. I found the --disable-snmpv1 in the
configure script but it leads to
I've searched the NetSNMP bug database for any issue with any status
that mentions "arm" and found 5 hits including "alarm" but nothing
relevant to my problem. I'm hoping that if this is a NetSNMP issue
it'll ring a bell with someone reading this list. I realize this is a
long shot.
Running NetS
> [EMAIL PROTECTED] wrote:
> > A white paper on building minimal Net-SNMP might be interesting
>
> http://www.net-snmp.org/FAQ.html#How_can_I_reduce_the_memory_footprint_
>
http://www.net-snmp.org/FAQ.html#How_can_I_reduce_the_installation_footprint_or_speed_up_compilation_
And here I was afr
> [EMAIL PROTECTED] wrote:
> > > Assumed we succeed in improving configure this way: are there
> > > any objectionsagainst turning on embedded perl by default in 5.4?
> >
> > We use Net-SNMP in an embedded system. I wouldn't want the default
> > build to grow any. (I'll keep my religious aversi
> ...
> Assumed we succeed in improving configure this way: are there any
> objectionsagainst turning on embedded perl by default in 5.4?
We use Net-SNMP in an embedded system. I wouldn't want the default
build to grow any. (I'll keep my religious aversion to Perl to myself.)
-
I know that, for example, ifIndex is 1-based so you have rows in
interfaces that are numbered starting with 1. And many OIDs that end in
0 are scalars (e.g., system.sysDescr.0). But are _all_ OIDs that end in
0 scalars? Is that just a convention or is it a contraint imposed by
SNMP or an unavoid
I don't remember seeing any response to this. Can someone please tell
me if I should expect to be able to add to ifAddrTable from a subagent
or if snmpd's implmentation is inextensible? Thanks.
--- Begin Message ---
> ...
> This section discusses several typical usage scenarios.
> ...
> 2)
I've written on the net-snmp-users list about my desire to implemement a
stand-alone Net-SNMP-based PPP subagent and, as far as I've seen, not
gotten any advice or feedback on how my subagent can implement ifTable
given restrictions and complications on how ifNumber is handled. I'm
now down to the
> I need to get the Net-SNMP supported OID (like system group,
> interface group, snmpTargetMIB group etc) values in private MIB
> instrumentation (implemented using mib2c frame work in net-snmp-
> 5.2.1).
> Is there a way to do so?
One way would be to send a request to the age
> I want an example code to write the simple mib. please
> send me the pointers.
Do you want to write the _MIB_ (that is the description of the data) or
do you want to write code to implement the MIB?
If you want to write the MIB, take any MIB you find on the net that it
reasonably close to wha
> On Tue, 2006-03-28 at 10:23 -0500, [EMAIL PROTECTED] wrote:
> > Well, that might be enough (though I can certainly write my own hex
> > encode/decode function) but why did I think they used part of
> > OpenSSL to accomplish base64 or md5 or something?
>
> There is code to handle MD5 checksums i
> On Tue, 2006-03-28 at 09:48 -0500, [EMAIL PROTECTED] wrote:
> > I have a Net-SNMP-based application that needs some weak
> > encryption to cloak strings from idle viewing (like the
> > conversion of createUser to usmUser in /var/net-snmp/snmpd.conf).
>
> "weak" encryption is right!
Yes, I kno
I have a Net-SNMP-based application that needs some weak encryption to
cloak strings from idle viewing (like the conversion of createUser to
usmUser in /var/net-snmp/snmpd.conf). I'm hoping that the encoding and
decoding routines are public enough that I can use them out of the
Net-SNMP libraries
> >>>>> On Thu, 02 Mar 2006 12:36:25 -0500, [EMAIL PROTECTED] said:
>
> cnelson> My change to configure.in had put this in configure:
>
> cnelson> if test "${enable_stripped+set}" = set; then
> cnelson> enableval="$enable_stripped"
&g
> On Thu, 2006-03-02 at 12:36 -0500, [EMAIL PROTECTED] wrote:
> > What configure.in code results in
> >
> > if test "${ac_cv_path_install+set}" = set; then
> > INSTALL="$ac_cv_path_install"
> > else
> > # As a last resort, use the slow shell script. We don't cache a
> > # path
> On Thu, 2006-03-02 at 09:01 -0500, [EMAIL PROTECTED] wrote:
> > I'm trying to address the feature request at
>
> aid=965788&group_id=12694&atid=362694
> >
> > but I can't get libtool to accept the -s option even though the
> > code appears to expect it to turn on "stripme".
>
> I'm not
> On Thu, 2006-03-02 at 09:01 -0500, [EMAIL PROTECTED] wrote:
> > I'm trying to address the feature request at
>
> aid=965788&group_id=12694&atid=362694
> >
> > but I can't get libtool to accept the -s option even though the
> > code appears to expect it to turn on "stripme".
>
> I'm not
I'm trying to address the feature request at
https://sourceforge.net/tracker/index.php?func=detail&aid=965788&group_id=12694&atid=362694
but I can't get libtool to accept the -s option even though the code
appears to expect it to turn on "stripme".
# libtool install mode
install)
..
We have an enterprise MIB that is divided into a public section where
you can get information about our devices and a "private" or
"experimental" section which we use for testing. There are entries in
the testing section that could make the device less secure than I would
wish so I'm trying to fig
> ...
> I'd also like to see a hard-coded list of tokens where were
> excluded (eg pass).
>
> We should probably apply this logic to *any* config file which is
> writable by anyone other than root.
Presently the persistent store for the agent has usmUser which is
lightly encrypted security info
> > ...
> > Can you expand on that? I think the original idea for changing
> > user/group was to have reduced privileges while running. The
> > primary advantage probably being that scripts and such wouldn't
> > run as root. It's still reasonable to expect that the agent's
> > configuration file
> On Sun, 04 Dec 2005 00:15:49 +0100 Thomas wrote:
> TA> [EMAIL PROTECTED] wrote:
> TA> > From: Robert Story <[EMAIL PROTECTED]>
> TA> >>Can anyone think of any objections to changing the group
> TA> >>earlier?
> TA> >>- It's new behaviour
> TA> >>- It will change the ownership of files created by
From: Robert Story <[EMAIL PROTECTED]>
> On Thu, 01 Dec 2005 12:52:48 -0500 [EMAIL PROTECTED] wrote:
> CRC> > The agentgroup has been processed, but that only 'remembers'
> CRC> > the value. It isn't used until later, and unfortunately
> CRC> > 'later' is after it has done the initial persistent
> ...
> The agentgroup has been processed, but that only 'remembers' the
> value. It isn't used until later, and unfortunately 'later' is
> after it has done the initial persistent store save, which is
> why you see the current behavior. You could try patching snmpd.c
> to move the groupid chan
(I started this on the -users list but it seems more appropriate here now.)
> > In http://sourceforge.net/mailarchive/message.php?msg_id=9547341
> > I asked how to set ownership of persistent files. I must have
> > gotten an answer (or figured it out) because my v5.1.1-based
> > system has bee
> >>>>> On Tue, 29 Nov 2005 07:17:44 -0500, [EMAIL PROTECTED] said:
>
> >> Announcement on the -announce and other mechanisms forthcoming
> >> tomorrow after a brief period of silence waiting to see if there
> are>> any screams.
>
> cnels
I DLd v5.2.2 and built it. Why do I end up with .so files with 9.0.0 in
their names? Why not 5.2.2? I'm very confused.
---
This SF.net email is sponsored by: Splunk Inc. Do you grep through log files
for problems? Stop! Download the new AJA
> Announcement on the -announce and other mechanisms forthcoming
> tomorrow after a brief period of silence waiting to see if there are
> any screams.
As noted yesterday on -users, I can't get traps to work in v5.2.2.rc6.
I was NOT able to prove that it's my problem. But if others have traps
wor
> On Wed, 23 Nov 2005 00:03:55 +0530 [EMAIL PROTECTED] wrote:
> SNC> We are writing a Tcl Wrapper over the NET-SNMP library as we
> SNC> did not want to use the library executables directly because
> SNC> of performance issues.
> SNC>
> SNC> The library uses fprintf(stderr,...) statements to print
> We are writing a Tcl Wrapper over the NET-SNMP library as we did
> not want to use the library executables directly because of
> performance issues.
>
> The library uses fprintf(stderr,...) statements to print the ouput.
>
> With the Tcl Wrapper, the net-snmp commands can be executed from
>
> ...
> So I have a patch that basically moved the extra checking into
> snmp_set_var_value(), and updates snmp_varlist_add_variable to use
> snmp_set_var_value().
>
> Any objections?
Sounds good to me.
---
SF.Net email is sponsored by: Tell u
As I'm writing a new MIB handler by filling in mib2c-generated code, I'm
reminded again how elegant Net-SNMP can be. I imagine part of that is a
reflection of the simplicity of SNMP itself but the Net-SNMP crew needs to take
credit, too. And I want to thank you all.
One of the best illustrati
> My router sents traps on link-down status to A linux box . In the
> routerside its sending the packets perfectly to server . But the
> counterpart (
> Server) doesnt seem to get anything I have both snmpd and
> snmptrapdrunning on my machine .. Also other functionality like
> SNMPWALK a
> On Thu, 16 Sep 2004 16:30:23 -0400 [EMAIL PROTECTED] wrote:
> CRC> I need someone other than root (which snmpd runs as) to be
> able to
> CRC> manipulate the persistent store (to add createUser
> directives). To that
> CRC> end, I've made the change below to the 5.1.1 version of
> read_config
> Does your policy and/or environment
> permit the use of "sudo program-that-creates-users"
> to accomplish what you want
> without patching the sources?
I have a demi-god user but that user can't read and write files that are 600 root.root
as the persistent store is after being rewritten. I fee
> Better coding practice to minimize the potential for abuse:
What "abuse"? Someone hijacking the file by giving it their own permissions? But the
sysadm would have to have given them ownership or sufficient priviledges to change
ownership.
I'm fairly new to net-snmp so I'm not indoctrinated
I need someone other than root (which snmpd runs as) to be able to manipulate the
persistent store (to add createUser directives). To that end, I've made the change
below to the 5.1.1 version of read_config.c. I'm looking for some feedback before I
go to the trouble of getting the latest versi
38 matches
Mail list logo