For several OCTECT STRING (SIZE 8) and OCTECT STRING (SIZE(1|8)) the python bindings are encoding the hexidecimal characters as ascii instead of binary.
Here is a simplified wireshark capture which displays the issue:
Expected Output: 0x00, getting 30 30 instead
XXxx XX XX 30 30 XX XX XX Xx Xx XX XX XX XX XX xX XX
Expected Output 0xFFFFFFFFFFFFFFFF, getting ascii encoded F (46) instead.
XXxX XX 46 46 46 46 46 46 46 46 46 46 46 46 46 46 46
XXxX 46 XX XX XX Xx Xx XX XX XX XX XX xX XX XX
Can you share sample code? With:
I got:
and while it's obviously a ridiculous set request, it is a well-formed message. It works with FF too.
Last edit: Bill Fenner 2014-07-23
By the way, the way to get the tracing is to put the following in
/etc/snmp/python.conf
:(Obviously this is system-wide so be careful leaving this configured)
Did a bit more investigation with this new information. Looks like there was a bug in our code which was using the net-snmp python bindings. Thanks for the help debugging, now we can continue to test and hopefully find and resolve more bugs.
This bug can be closed.