On 6/22/25 11:44 AM, JustCoding247 wrote:
I am writing to inquire about the proper procedure for reporting a
potential security vulnerability I have discovered in Net-SNMP.
While analyzing the Net-SNMP source code, I have identified what appears
to be a buffer overflow vulnerability in the net
Hi All,
Can I use attribute *data to send a string token in agentx get pdu
typedef struct variable_list {
/** NULL for last variable */
struct variable_list *next_variable;
/** Object identifier of variable */
oid*name;
/** number of subid's in name */
size_t
On Sat, 8 Mar 2025 at 10:50, Wes Hardaker via Net-snmp-coders <
net-snmp-coders@lists.sourceforge.net> wrote:
> only be used for bug fixes at this point. Please give 5.10.pre1 a
> whirl -- it certainly won't be perfect yet.
>
I've built 5.10~pre1 using the Debian package setup, was a few patches
On 3/14/25 3:06 PM, Bart Van Assche wrote:
The above patch has been split and has been submitted as a pull request
to the ntopng project. See also
https://github.com/ntop/ntopng/pull/9028#issuecomment-2718468627.
This pull request has been merged.
Bart.
__
On 3/10/25 4:27 AM, Stuart Henderson wrote:
gnugk:
snmp.cxx:87:11: error: expected '(' for function-style cast or type construction
trapOID[ OID_LENGTH(trapOID) - 1 ] = trapNumber;
^~~
/usr/local/include/net-snmp/library/asn1.h:65:56: note: expanded fro
On 3/10/25 5:48 PM, Bart Van Assche wrote:
diff --git a/include/SNMPSession.h b/include/SNMPSession.h
index 932b3d96ce17..e12ef0a2f893 100644
--- a/include/SNMPSession.h
+++ b/include/SNMPSession.h
@@ -32,7 +32,7 @@
class SNMPSession {
public:
struct snmp_session session;
- void *sessio
On 3/10/25 1:39 PM, Bart Van Assche wrote:
Are there any objections against removing NOAUTODEPS support? I noticed
that ./config.status is often run if no changes have been made to any
configure script. Hence this proposal to remove NOAUTODEPS support and
instead to let developers run the configu
On 3/10/25 4:27 AM, Stuart Henderson wrote:
To see how things are going with API changes, I've tested building
everything in OpenBSD ports which depends on this. (I'm not suggesting
that Net-SNMP needs to change anything unless these are unexpected, but
at least giving other package maintainers a
On 3/10/25 4:27 AM, Stuart Henderson wrote:
ntopng:
various from snmp_sess_* functions taking struct session_list * rather
than void *, and also
src/SNMP.cpp:452:47: error: assigning to 'oid *' (aka 'unsigned long *') from
incompatible type 'const oid[10]' (aka 'const unsigned long[10]')
On 2025/03/07 15:34, Wes Hardaker via Net-snmp-coders wrote:
>
> Greetings all,
>
> It's been a while --- time to finally release a 5.10 pre-release
> candidate. Consider this a feature freeze and the master branch should
> only be used for bug fixes at this point. Please give 5.10.pre1 a
> wh
On 2/28/25 5:14 AM, Michael Schmidt via Net-snmp-coders wrote:
diff --git a/agent/snmp_agent.c b/agent/snmp_agent.c
index 9913a968e1..c728059ac8 100644
--- a/agent/snmp_agent.c
+++ b/agent/snmp_agent.c
@@ -1908,6 +1908,8 @@ netsnmp_wrap_up_request(netsnmp_agent_session *asp, int
status)
}
Hi,
Thank you Menase, Laurent, Craig Small and Magnus Fromreide.
I am using snmp4j as snmp-agent and snmptrapd as trap-receiver. I would
like to know how snmptrapd can be configured to authenticate AES192 of
snmp4j ?
If company develop support for AES192 then how will the generic
snmp-man
On Tue, Feb 18, 2025 at 03:19:27PM +0530, Pushpa Thimmaiah wrote:
> Hi All,
>
> I would like to understand why does oid of AES128 and AES192 not in same
> branch.
> AES128 : .1.3.6.1.6.3.10.1.2.4
> AES192 : .1.3.6.1.4.1.14832.1.3
>
It has to do with timing and processes.
If you look up the OID
Hi Pushpa
According to
http://www.net-snmp.org/wiki/index.php/Strong_Authentication_or_Encryption
1.3.6.1.4.1.14832.1.3 is not supported since not defined by RFC if I read well,
but some other RFC defined OID were defined in rfc7860
Which if I am not wrong are:
snmpUsmHmacSha2MIB
1.3.6.1.2.1.235
Thank you for the suggestions. Based on your suggestion, we were trying
different things and figured out a way to make it work.
One of the first things we did was, remove all the warnings since there
were a lot. Then we saw that the compiler was telling us that there are
more than 255 variables wh
On Thu, Jan 09, 2025 at 10:58:22AM +0530, Pushpa Thimmaiah wrote:
> Hi All,
>
> Net-snmp FAQ reads that agentx can be run with different unix socket
> address (i.e other that /var/agentx/master). I too verified it works fine.
> Is there any configuration file that reads by subagent (eg:./mysubagen
Hi All,
Net-snmp FAQ reads that agentx can be run with different unix socket
address (i.e other that /var/agentx/master). I too verified it works fine.
Is there any configuration file that reads by subagent (eg:./mysubagent in
https://net-snmp.sourceforge.io/wiki/index.php/TUT:Writing_a_Subagent)
Hi,
You can definitely have more than 255 custom OIDs, the trick is you only
have 255 values for magic. I'm surprised hacking the magic value didn't
crash it before.
There's probably a few options; the good, the bad and the ugly.
Good
Rebuild the MIB and functions so each type of variable uses
Hi Bill Fenner,
Issue resolved. I have rebooted the device and started snmpd . socket file
/var/agentx/master got created and example code is working.
Thanks,
Pushpa.T
On Thu, Oct 3, 2024 at 5:09 PM Pushpa Thimmaiah
wrote:
> Hi Bill Fenner,
>
> Thank you. I enabled Unix transport and added 'a
Hi Bill Fenner,
Thank you. I enabled Unix transport and added 'agentXSocket
/var/agentx/master' in /etc/snmp/snmpd.conf, and I was able to execute
snmpd. There was no /var/agentx/master created after starting snmpd, and
AgentX was unable to connect to snmpd.
I am following the AgentX tutorial at
h
Hi Pushpa,
You are not enabling UNIX domain support, so net-snmp can't open the UNIX
domain socket for agentx. You can either use the TCP socket by configuring
with something like
agentXSocket tcp:127.0.0.1:705
and then configuring clients similarly, e.g., "snmptrap -X tcp:705"
Or adding the UN
That makes sense Craig. Thank you for your input.
To summarize the issue, we are unable to use more than 255 OID entries and
would love to get any help on this issue.
Is there another way to use more than 255 custom OID's?
Thank You to anyone looking into this matter.
- Neeraj
On Mon, 29 Jul 2
On Wed, 18 Sept 2024 at 14:35, Craig Small wrote:
[...]
Hello,
Thank you lots for confirming what I already feared would be the case.
I like the idea of putting something in front of the SNMP daemon that will
manage ports opening and closing, I never thought of this, but when
thinking about it,
On Mon, 16 Sept 2024 at 22:44, Teus Benschop wrote:
> The daemon kept the same ports open as before editing the snmpd.conf even
> in case some agentaddress entries were removed from snmpd.conf.
>
Some changes to the configuration file can be enabled with a reload or HUP
and some things need a com
Hi All,
Kindly confirm whether snmpv3 Inform should be sent out till response
received from NMS. Kindly provide RFC reference.
Regards,
Pushpa.T
On Tue, Aug 6, 2024 at 8:02 PM Pushpa Thimmaiah
wrote:
> Hi Mostafa,
>
> Thank you for response.
> I have given information that SNMPv3 inform sh
Hi Mostafa,
Thank you for response.
I have given information that SNMPv3 inform should be sent out until it
will get response from NMS. I didnot not get much information about SNMPv3
Informs in RFC3414. Could you please share RFC that has information about
SNMPv3 inform.
Thanks,
Pushpa.T
On T
On 7/30/24 11:46 AM, Niels Baggesen wrote:
You probably need to rerun ldconfig after doing the install.
Since the Net-SNMP library path is passed to the linker with the
linker option -rpath, is it really necessary to run ldconfig after
having installed Net-SNMP? See also commit 3857d43233d4 fro
Tuesday, July 30, 2024 2:46 PM
To: net-snmp-coders@lists.sourceforge.net
Subject: Re: libnetsnmpagent.so.35: cannot open shared object file: No such
file or directory
Using the defaults, I would expect it to install into /usr/local/{sbin,bin} ?
You probably need to rerun ldconfig after doing the i
meout"
-Original Message-
From: Niels Baggesen
Sent: Tuesday, July 30, 2024 3:29 PM
To: net-snmp-coders@lists.sourceforge.net
Subject: Re: libnetsnmpagent.so.35: cannot open shared object file: No such
file or directory
Den 30-07-2024 kl. 21:22 skrev Peter Majdalani:
> It
Den 30-07-2024 kl. 21:22 skrev Peter Majdalani:
> It installed into /usr/local/bin
So why are you running /usr/sbin/snmpd and not /usr/local/sbin/snmpd?
How was /usr/sbin/snmpd installed on your system, and without the proper
libraries?
> A solution I tried was to make symbolic links inside t
Using the defaults, I would expect it to install into
/usr/local/{sbin,bin} ?
You probably need to rerun ldconfig after doing the install.
/Niels
Den 30-07-2024 kl. 16:03 skrev Peter Majdalani:
Hi,
I am currently trying to get net-snmp to work on my Ubuntu 20.04.6 Linux
machine.
I have do
On Fri, 12 Jul 2024 at 08:31, Neeraj Bansal wrote:
> We recompile everything and install no problem, but instead of fixing our
> problem it caused net-snmp-5.9.3 to not be able to start. The error it gives
> is: Bad user id, which could be a red herring. example below:
> [root@testboard: /root#
We are still stuck on this issue. We would really like it if someone could
guide us. Is somebody else facing the same issue?
Please let me know if I can provide more information.
Regards,
Neeraj Bansal
On Thu, 11 Jul 2024 at 15:30, Neeraj Bansal
wrote:
> Hello,
>
> Net-SNMP version: 5.9.3
> O
Pushpa Thimmaiah writes:
> I would like to know invalid characters or characters that are not
> allowed for snmpv3 authPhrase and privPhrase. Does the following
> password valid.
You should be able to put passwords with interesting characters in
quotes if you need them.
--
Wes Hardaker
Please
Pushpa Thimmaiah writes:
> Could you please confirm net-snmp allows same snmpv3 user with
> different credentials?
No that is not possible. It actually doesn't have to do with Net-SNMP,
the SNMPv3 protocol alone requires a separate user name if you need
different credentials.
--
Wes Hardaker
Dear Wes,
Thankyou for your input. Indeed I checked it before this post that "-Dusm"
can capture some Unknown user, bad Auth/Priv password.
such logs then can be filtered in the fail2ban.
It also makes sense about what you say regarding setting up a firewall.
Incase someone is wondering about th
Prankur Chauhan writes:
> Is it possible to identify a malicious IP who is trying multiple times
> authentication requests with wrong credentials and increase the
> response time for each subsequent auth request, consequently also lock
> him/her out for some duration?
>
> Do you guys know if snm
On 6/11/24 7:04 AM, Mark Johnston wrote:
commit 304f8cf7f176920cb689d237f612c9a25cd14e84
Author: Mark Johnston
Date: Thu Apr 4 16:34:26 2024 -0400
snmpd: Always open libkvm in "safe mode" on FreeBSD
This patch has been applied on the V5-9-patches and master branches.
Thanks for the pat
On Mon, Jun 10, 2024 at 03:51:33PM -0700, Bart Van Assche wrote:
>
> On 6/10/24 13:27, Mark Johnston wrote:
> > Would it be helpful for me to submit a patch? A few of us have been
> > testing snmpd with my original patch (to tell libkvm not to open
> > /dev/kmem etc.) for a while now with no issu
On 6/10/24 13:27, Mark Johnston wrote:
Would it be helpful for me to submit a patch? A few of us have been
testing snmpd with my original patch (to tell libkvm not to open
/dev/kmem etc.) for a while now with no issues.
A patch definitely would be welcome.
Thanks,
Bart.
_
On Fri, Apr 12, 2024 at 03:51:51PM -0700, Bart Van Assche wrote:
> On 4/12/24 7:29 AM, Mark Johnston wrote:
> > Do you mean that on FreeBSD we should always perform an unprivileged
> > kvm_openfile() call, no matter whether --without-kmem-usage is
> > specified?
>
> Yes, that's what I'm proposing.
#x27; -x AES-256 -X 'admin_test_password#9812'
> /tmp/xsnmp/snmpagent create danellb adminextronshaaes256
> snmpset: Decryption error
> + status=
>
>
>
> --
> *From:* Bill Fenner
> *Sent:* Tuesday, June 4, 2024 11:13 PM
> *To:* su
Hi Sukeerthi,
You're looking at the code that is used when NETSNMP_USE_PKCS11 is
defined. The SHA2 hashes such as SHA256 are only available with OpenSSL,
in which case we use sc_get_openssl_hashfn() to pick the hash function that
corresponds with the configured hash algorithm.
Bill
On Fri, M
On Wed, 22 May 2024 at 01:58, Bart Van Assche wrote:
> The attached patch in combination with a patch that reduces code
> duplication have been applied. Please retest.
>
> Hello Bart,
That is a nice update to reduce code duplication, and thanks for applying
the patch plus the update.
I've teste
Thank you Josef Ridky and Niels Baggesen
On Tue, May 21, 2024 at 10:20 PM Niels Baggesen wrote:
> Den 21-05-2024 kl. 13:34 skrev Niels Baggesen:
>
> > SIGTERM is not kill -9, it is kill -16. kill -9 is SIGKILL
>
> Whoops, minor typo, SIGTERM is 15, not 16. Thanks to jhawk!
>
> /Niels
>
> --
> Ni
On 5/21/24 5:14 AM, Teus Benschop wrote:
Thank you for the go-ahead.
I went ahead and created the patch for the UDP domain.
In line with the previous patch where you had added support for IPv6, I
have added that support to this patch too.
It was tested and works fine when the snmpd listens on ud
Den 21-05-2024 kl. 13:34 skrev Niels Baggesen:
SIGTERM is not kill -9, it is kill -16. kill -9 is SIGKILL
Whoops, minor typo, SIGTERM is 15, not 16. Thanks to jhawk!
/Niels
--
Niels Baggesen -- @home -- Århus -- Denmark -- ni...@baggesen.net
The purpose of computing is insight, not numbers
On Mon, 13 May 2024 at 14:26, Bart Van Assche wrote:
> On 5/13/24 03:05, Teus Benschop wrote:
>
>
> The patches work for the TCP domain, and that certainly is sufficient for
> us, and we are happy.
>
> Would it also be helpful if I would create similar patches for the *UDP*
> domain?
>
> Generali
Den 21-05-2024 kl. 10:30 skrev Pushpa Thimmaiah:
Hi All,
Kindly confirm that 'kill -9' is valid way to stop snmpd.
I am writing service script for systemctl to stop snmpd and would like
to understand correct way of stopping the daemon.
According to Source code agent/snmpd.c , SIGTERM (kill
You may take a look at
https://src.fedoraproject.org/rpms/net-snmp/blob/rawhide/f/snmpd.service
for a working example in Fedora/RHEL.
Best regards
Josef Ridky
Senior Software Engineer
Core Services Team
Red Hat Czech, s.r.o.
On Tue, May 21, 2024 at 10:29 AM Pushpa Thimmaiah <
pushpa.thimma...@g
On 5/13/24 03:05, Teus Benschop wrote:
The patches work for the TCP domain, and that certainly is sufficient
for us, and we are happy.
Would it also be helpful if I would create similar patches for the
*UDP* domain?
Generalizing this work by adding UDP support for this mechanism sounds
go
On Thu, 9 May 2024 at 18:20, Teus Benschop wrote:
>
> I have tested the master branch on GitHub, including branch V5-9, on
> getting the local listening port number of the agent.
> It works well for TCP over IPv4 and also over IPv6.
> In both cases I get to see the local listening port number whe
Hello Bart,
Thank you for adding IPv6 support to the patch, and for integrating all the
changes into the V5-9 branch.
We are so glad about that.
I have tested the master branch on GitHub, including branch V5-9, on
getting the local listening port number of the agent.
It works well for TCP over I
On 5/8/24 1:42 AM, Teus Benschop wrote:
I have implemented the f_setup_session() callback in
the snmpTCPBaseDomain.h/.c files.
This callback obtains the port number and copies that into the session
object.
Then from the session object, the local_port is available while
processing the SNMP req
On Wed, 3 Apr 2024 at 18:45, Bart Van Assche wrote:
> I think this is the callchain for registering the ports that the agent
> listens on:
>
> init_master_agent()
> netsnmp_agent_listen_on()
> netsnmp_transport_open_server()
> netsnmp_register_agent_nsap()
> netsnmp_sess_config_tr
On 4/30/24 10:53 AM, Mark Johnston wrote:
Fix var_udp6 and var_tcp6 on FreeBSD
> [ ... ]
This patch has been applied on the V5-9-patches and master branches.
Thanks for the patch!
Bart.
___
Net-snmp-coders mailing list
Net-snmp-coders@lists.source
On Fri, Apr 12, 2024 at 03:51:51PM -0700, Bart Van Assche wrote:
> On 4/12/24 7:29 AM, Mark Johnston wrote:
> > Do you mean that on FreeBSD we should always perform an unprivileged
> > kvm_openfile() call, no matter whether --without-kmem-usage is
> > specified?
>
> Yes, that's what I'm proposing.
Hi Magnus Fromreide,
Thanks for clarifying.
Thanks,
Pushpa.T
On Thu, Apr 25, 2024 at 10:17 AM Magnus Fromreide
wrote:
> On Tue, Apr 23, 2024 at 09:51:08AM +0530, Pushpa Thimmaiah wrote:
> > Hi All,
> >
> > Could you please let me know length of snmpEngineID. Is it 12 octets or
> 32
> > octets
On Tue, Apr 23, 2024 at 09:51:08AM +0530, Pushpa Thimmaiah wrote:
> Hi All,
>
> Could you please let me know length of snmpEngineID. Is it 12 octets or 32
> octets.
>
> In RFC 3411 (https://www.ietf.org/rfc/rfc3411.txt) ,
> mib object 'snmpEngineID' says 12 octets in description and 32 octet in
On Fri, Apr 12, 2024 at 03:51:51PM -0700, Bart Van Assche wrote:
> On 4/12/24 7:29 AM, Mark Johnston wrote:
> > Do you mean that on FreeBSD we should always perform an unprivileged
> > kvm_openfile() call, no matter whether --without-kmem-usage is
> > specified?
>
> Yes, that's what I'm proposing.
On 4/12/24 7:29 AM, Mark Johnston wrote:
Do you mean that on FreeBSD we should always perform an unprivileged
kvm_openfile() call, no matter whether --without-kmem-usage is
specified?
Yes, that's what I'm proposing. If someone disagrees, please share your
opinion now.
Thanks,
Bart.
On Fri, Apr 12, 2024 at 07:13:41AM -0700, Bart Van Assche wrote:
> On 4/12/24 06:44, Mark Johnston wrote:
> > I would like to introduce the patch below, which gets compiled when
> > --without-kmem-usage is specified. In this case, snmpd will still use
> > libkvm, but won't open /dev/(k)mem. In my
On 4/12/24 06:44, Mark Johnston wrote:
I would like to introduce the patch below, which gets compiled when
--without-kmem-usage is specified. In this case, snmpd will still use
libkvm, but won't open /dev/(k)mem. In my testing so far, this works
perfectly. Does anyone have any thoughts on this
On Wed, 3 Apr 2024 at 18:45, Bart Van Assche wrote:
>
> I think this is the callchain for registering the ports that the agent
> listens on:
>
[...]
> One possible approach is to implement the .f_setup_session() callback in
> the TCP transport and to make it copy the port information from the
>
On Wed, 3 Apr 2024 at 16:05, Bart Van Assche wrote:
> Something else must be going on. This is the code from configure.ac that
> checks for libnl-3:
>
> if test "x$ac_cv_header_netlink_netlink_h" = xyes; then
> AC_EGREP_HEADER([nl_socket_free], [netlink/socket.h],
>
On 4/3/24 02:35, Teus Benschop wrote:
A snmpd was set to listen on 10 ports through multiple entries like
“agentaddress tcp:” in the snmpd.conf file.
It was verified through snmpget that the snmpd listens on all 10 ports.
Function “netsnmp_callback_open” in file
snmplib/transports/snmpCallba
On Thu, 28 Mar 2024 at 00:13, Bart Van Assche wrote:
> Thanks for the background information. I'm not sure the Net-SNMP API needs
> to be modified to realize this. How about the following approach:
>
>- Use netsnmp_register_handler() in MIB implementations to associate
>OIDs with callback
On 4/2/24 13:40, Craig Small wrote:
On Wed, 3 Apr 2024 at 02:19, Bart Van Assche wrote:
Can you please check the configure script logs to see why libnl-3 was
not detected?
libnl-3 was detected:
configure:27875: $PKG_CONFIG --exists --print-errors "libnl-3.0"
configure:27878: $? = 0
con
On Wed, 3 Apr 2024 at 02:19, Bart Van Assche wrote:
> Can you please check the configure script logs to see why libnl-3 was
> not detected?
>
libnl-3 was detected:
configure:27875: $PKG_CONFIG --exists --print-errors "libnl-3.0"
configure:27878: $? = 0
configure:27936: result: yes
But libnl-rout
On 4/2/24 01:49, Craig Small via Net-snmp-coders wrote:
Hello All,
I was attempting to compile the git head of net-snmp. One big change
is that uses netlink sockets instead of reading /proc/net/*
The issue is the API is different to the library I can see.
mibgroup/mibII/tcpTable.c:631:12:
On Thu, 28 Mar 2024 at 00:13, Bart Van Assche wrote:
> Hi Teus,
>
> Thanks for the background information. I'm not sure the Net-SNMP API needs
> to be modified to realize this. How about the following approach:
>
>- Use netsnmp_register_handler() in MIB implementations to associate
>OIDs
On 3/27/24 00:15, Teus Benschop wrote:
On Wed, 27 Mar 2024 at 00:58, Bart Van Assche wrote:
Please explain why you want to obtain that information and also
how you plan to use it. Which APIs to modify will depend on the
answer to that question.
Hello Bert,
Thank you for asking t
On Wed, 27 Mar 2024 at 00:58, Bart Van Assche wrote:
> Please explain why you want to obtain that information and also how you
> plan to use it. Which APIs to modify will depend on the answer to that
> question.
>
>
>
Hello Bert,
Thank you for asking this question.
The background to this is tha
On 3/25/24 11:26, Teus Benschop wrote:
2. What are the ideas to expose this agent_tcp_port_number via the
API? (Possibly I could add a function in the public API, that gets
this variable and exposes it as a call.) Ideas?
Please explain why you want to obtain that information and also how you
Den 26-03-2024 kl. 10:10 skrev Craig Small via Net-snmp-coders:
> Hi,
> This email is about working out how the LM-SENSORS MIB should be
updated. If it was just a matter of updating the SNMP agent, I'd just
create a pull request but the MIB is (might be?) different.
Great!
> How do I get th
On 3/26/24 02:10, Craig Small via Net-snmp-coders wrote:
This email is about working out how the LM-SENSORS MIB should be
updated. If it was just a matter of updating the SNMP agent, I'd just
create a pull request but the MIB is (might be?) different.
The issue is that Gauge32 can only represe
Hello again,
On the topic of getting the agent listening port number while processing a
SNMP equest, discussed in previous emails:
I am working on a proposal for a patch, and have this code already, as a
first possible partial solution to the above wish.
File: snmplib/transports/snmpTCPBaseDomai
In SNMP v3, any message that requires that the receiver sends back a reply, the
sender must use the receiver engine id. Engine Id is a unique value that
identifies a specific SNMP device.
For example, get, set, walk from the SNMP manager require that the manager
use the agent engine id.
ping
On Thu, 2024-01-18 at 18:07 +0100, Martijn van Duren wrote:
> hello coders@,
>
> First let me introduce myself. I'm mart...@openbsd.org and the current
> maintainer of OpenBSD's own snmp stack.
>
> I would like to include UCD-DISKIO-MIB and it's dependency UCD-SNMP-MIB
> into OpenBSD base a
Hi Vivek,
There are some types of configuration that can only be applied with a
restart, because the option to change them has not yet been implemented.
There is nothing fundamental that prevents this from being implemented, but
it is not a simple fix, which is why it hasn't been done yet.
Bill
.
Kind regards,
Vincent
De : Martijn van Duren
Envoyé : mardi 30 janvier 2024 12:33
À : Vincent Gilson
Cc : net-snmp-coders@lists.sourceforge.net
Objet : Re: SNMPv3 DES issue
[You don't often get email from nets...@list.imperialat.at. Learn why this is
important at https://a
ot; any priv exact viewalltboxmibs viewalltboxmibs none
> rwuser -s usm vincent priv -V viewalltboxmibs
>
>
>
>
>
>
> De : Martijn van Duren
> Envoyé : lundi 29 janvier 2024 18:28
> À : Vincent Gilson
> Cc : net-snmp-coders@lists.sourceforg
none
rwuser -s usm vincent priv -V viewalltboxmibs
De : Martijn van Duren
Envoyé : lundi 29 janvier 2024 18:28
À : Vincent Gilson
Cc : net-snmp-coders@lists.sourceforge.net
Objet : Re: SNMPv3 DES issue
[You don't often get email from nets...@list.imperialat.at. Learn why this is
important at https
Thanks Niels,
Currently, here’s my full conf file :
agentAddress udp:161
createUser vincent SHA "myPassPhrase" DES "myPrivAuthPhrase"
group grouptboxusmv3 usm vincent
view viewalltboxmibs included .1
access grouptboxusmv3 "" any priv exact viewalltboxmibs viewalltboxmibs none
rwuser -s usm vinc
er: usmUser handler not registered for this time
>
> …
>
> usm: match on user vincent
> trace: usm_check_secLevel(): snmpusm.c, 2738:
> comparex: Comparing: 1 3 SNMPv2-SMI::snmpModules.10.1.2.1
> trace: usm_check_secLevel(): snmpusm.c, 2747:
> usm: Level: 3
>
been configured for that level of
security)
De : Martijn van Duren
Envoyé : samedi 27 janvier 2024 10:33
À : Vincent Gilson ;
net-snmp-coders@lists.sourceforge.net
Objet : Re: SNMPv3 DES issue
[You don't often get email from nets...@list.imperialat.at. Learn why this is
important at https:
Nothing stands out to me at a first glance. What does running snmpd with
-Dusm give you for extra information?
Sincerely,
Martijn van Duren
On Fri, 2024-01-26 at 10:10 +, Vincent Gilson via Net-snmp-coders wrote:
>
>
>
> Hello !
>
> I’m working on a net-snmp agent integrated into an ind
Den 11-01-2024 kl. 14:25 skrev Christophe Leroy via Net-snmp-coders:
When using IP-MIB::ipAddrTable the manager is notified immediately but
when using IP-MIB::ipAddressTable the notification is delayed several
seconds and after investigation it looks like it is because the content
of IP-MIB::ipAd
IMO we need to revert this patch, as it would cause issues in production.
This is a partial fix.
-Feroz
On Tue, Jan 9, 2024 at 2:35 PM Vivek Aditya wrote:
> Thanks for quick response
>
> I am working on this feature and able to achieve partial success. There is
> one use case where it does not
Thanks for quick response
I am working on this feature and able to achieve partial success. There is
one use case where it does not work. It's a pretty small code
change. Please take a look at the commit message for the logic and to
understand the exact use-case where it isn't working. Any help or
Vivek Aditya writes:
> I want the SNMP to start listening on a new agent port without restart.
> Just sending SIGHUP to snmpd does not work.
>
> Is there a way to do it or has this issue already been fixed? Any help
> would be appreciated.
That's a good feature request, but I don't think we ha
Venkateswarlu K writes:
> We are using net-snmp version 5.7.3 in our ARM based Access Point. Recently we
> are observing snmp core in snmp_alarm.c file with below bt.
Based on the image, we'd need to see in a debugger what the 'a'
structure looks like. I'm not sure how the alarm stack got corru
On Wed, Jan 03, 2024 at 09:54:58AM +, Stuart Henderson wrote:
> On 2024/01/02 19:48, Denis Hainsworth wrote:
> > Apologies if this is terribly off topic. However its a very niche
> > mib/snmp question I'm hoping someone can guide me on as to if a vendor
> > is right or not.
> > Are they simp
On 2024/01/02 19:48, Denis Hainsworth wrote:
> Apologies if this is terribly off topic. However its a very niche
> mib/snmp question I'm hoping someone can guide me on as to if a vendor
> is right or not.
>
> Up till now all vendors I know have implemented the index for
> .iso.org.dod.internet.m
Le 26/12/2023 à 03:01, Bart Van Assche a écrit :
> [Some people who received this message don't often get email from
> bvanass...@acm.org. Learn why this is important at
> https://aka.ms/LearnAboutSenderIdentification ]
>
> On 12/17/23 09:51, Christophe Leroy wrote:
>> While upgrading from NET
On 12/17/23 09:51, Christophe Leroy wrote:
While upgrading from NETsnmp 5.7.3 to 5.9.3 I encounter a problem which
is that root(/) filesystem is missing from UCD-SNMP-MIB disk table:
Is https://github.com/net-snmp/net-snmp/pull/764 perhaps intended as a
fix for this issue?
Thanks,
Bart.
__
Hi Bill Fenner,
Thank you. I will try the script.
Regards,
Pushpa.T
On Mon, Nov 20, 2023 at 8:41 PM Bill Fenner wrote:
> Hi Pushpa,
>
> You can try
> https://gist.github.com/fenner/696cbb2d0e4429a8dff32af70b2bb8b1 for some
> sample python code.
>
> Bill
>
>
> On Fri, Oct 20, 2023 at 4:45 AM
Hi Pushpa,
You can try https://gist.github.com/fenner/696cbb2d0e4429a8dff32af70b2bb8b1
for some sample python code.
Bill
On Fri, Oct 20, 2023 at 4:45 AM Pushpa Thimmaiah
wrote:
> Hi,
>
> I would like to convert cleartext password to localized key for trapsess
> line. I understood that one
Hi Magnus Fromreide,
Thanks a lot for information. I will go through the RFS 2578.
Regards,
Pushpa.T
On Mon, Oct 16, 2023 at 11:35 PM Magnus Fromreide
wrote:
> On Mon, Oct 16, 2023 at 02:14:28PM +0530, Pushpa Thimmaiah wrote:
> > Hi,
> >
> > Could you please provide information about followi
On Mon, Oct 16, 2023 at 02:14:28PM +0530, Pushpa Thimmaiah wrote:
> Hi,
>
> Could you please provide information about following
> 1. Is there any lifespan for enterprise OID allocated by IANA.
OID allocations are forever.
> 2. When a company got acquired by another company,
> Eg: old com
1 - 100 of 15885 matches
Mail list logo