From: Wes H. <har...@us...> - 2002-05-02 05:31:04
|
>>>>> On Wed, 1 May 2002 18:35:03 -0400, Anurag Bhatia <An...@am...> said: Anurag> Has this issue ever come across and dealt in latest releases?? Ok, I've been meaning to look into this but I've simply not had the time yet. The thing is that blank passwords are illegal. They must be at least 8 characters long, according to the spec. Now, secondly the protocol itself doesn't use passwords in the first place. It uses keys (which can be derived from passwords). So the whole problem is a bit confusing to me. It sounds like a really strange. problem with the manager that you're using. So, to give me some more data to look at, can you do the following: run snmpd with the "-d -Dusm" flags and generate one request to it using your "blank" password and send the results to the list. The packet dumps and usm debugging output should help explain some things to me. -- Wes Hardaker Please mail all replies to net...@li... |