You can subscribe to this list here.
2000 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
(14) |
Nov
(315) |
Dec
(298) |
---|---|---|---|---|---|---|---|---|---|---|---|---|
2001 |
Jan
(254) |
Feb
(467) |
Mar
(430) |
Apr
(345) |
May
(406) |
Jun
(336) |
Jul
(313) |
Aug
(265) |
Sep
(433) |
Oct
(462) |
Nov
(387) |
Dec
(232) |
2002 |
Jan
(352) |
Feb
(556) |
Mar
(463) |
Apr
(500) |
May
(557) |
Jun
(337) |
Jul
(317) |
Aug
(279) |
Sep
(273) |
Oct
(354) |
Nov
(267) |
Dec
(347) |
2003 |
Jan
(351) |
Feb
(445) |
Mar
(520) |
Apr
(665) |
May
(499) |
Jun
(393) |
Jul
(304) |
Aug
(425) |
Sep
(262) |
Oct
(329) |
Nov
(220) |
Dec
(174) |
2004 |
Jan
(365) |
Feb
(479) |
Mar
(515) |
Apr
(522) |
May
(214) |
Jun
(471) |
Jul
(292) |
Aug
(341) |
Sep
(243) |
Oct
(446) |
Nov
(294) |
Dec
(147) |
2005 |
Jan
(171) |
Feb
(209) |
Mar
(218) |
Apr
(321) |
May
(233) |
Jun
(534) |
Jul
(268) |
Aug
(345) |
Sep
(498) |
Oct
(557) |
Nov
(459) |
Dec
(238) |
2006 |
Jan
(288) |
Feb
(180) |
Mar
(151) |
Apr
(113) |
May
(164) |
Jun
(277) |
Jul
(160) |
Aug
(383) |
Sep
(221) |
Oct
(404) |
Nov
(358) |
Dec
(163) |
2007 |
Jan
(293) |
Feb
(175) |
Mar
(202) |
Apr
(155) |
May
(427) |
Jun
(484) |
Jul
(414) |
Aug
(125) |
Sep
(131) |
Oct
(160) |
Nov
(79) |
Dec
(70) |
2008 |
Jan
(133) |
Feb
(115) |
Mar
(158) |
Apr
(194) |
May
(197) |
Jun
(230) |
Jul
(146) |
Aug
(68) |
Sep
(93) |
Oct
(53) |
Nov
(95) |
Dec
(69) |
2009 |
Jan
(81) |
Feb
(162) |
Mar
(215) |
Apr
(216) |
May
(78) |
Jun
(131) |
Jul
(61) |
Aug
(176) |
Sep
(127) |
Oct
(28) |
Nov
(83) |
Dec
(94) |
2010 |
Jan
(100) |
Feb
(187) |
Mar
(320) |
Apr
(161) |
May
(194) |
Jun
(142) |
Jul
(129) |
Aug
(139) |
Sep
(239) |
Oct
(202) |
Nov
(139) |
Dec
(196) |
2011 |
Jan
(195) |
Feb
(191) |
Mar
(201) |
Apr
(127) |
May
(84) |
Jun
(126) |
Jul
(101) |
Aug
(237) |
Sep
(123) |
Oct
(104) |
Nov
(197) |
Dec
(114) |
2012 |
Jan
(65) |
Feb
(85) |
Mar
(129) |
Apr
(84) |
May
(94) |
Jun
(83) |
Jul
(89) |
Aug
(85) |
Sep
(89) |
Oct
(73) |
Nov
(34) |
Dec
(38) |
2013 |
Jan
(89) |
Feb
(30) |
Mar
(25) |
Apr
(18) |
May
(20) |
Jun
(45) |
Jul
(74) |
Aug
(37) |
Sep
(72) |
Oct
(30) |
Nov
(67) |
Dec
(24) |
2014 |
Jan
(23) |
Feb
(16) |
Mar
(40) |
Apr
(37) |
May
(12) |
Jun
(18) |
Jul
(30) |
Aug
(26) |
Sep
(24) |
Oct
(32) |
Nov
(15) |
Dec
(33) |
2015 |
Jan
(15) |
Feb
(45) |
Mar
(21) |
Apr
(24) |
May
(22) |
Jun
(7) |
Jul
(57) |
Aug
(17) |
Sep
(16) |
Oct
(3) |
Nov
(8) |
Dec
(13) |
2016 |
Jan
(7) |
Feb
(14) |
Mar
(40) |
Apr
(8) |
May
(10) |
Jun
(6) |
Jul
(8) |
Aug
(10) |
Sep
(19) |
Oct
(20) |
Nov
(45) |
Dec
(10) |
2017 |
Jan
(10) |
Feb
(12) |
Mar
(3) |
Apr
(17) |
May
(41) |
Jun
(21) |
Jul
(13) |
Aug
(13) |
Sep
(7) |
Oct
(23) |
Nov
(10) |
Dec
(23) |
2018 |
Jan
(45) |
Feb
(3) |
Mar
(57) |
Apr
(107) |
May
(173) |
Jun
(47) |
Jul
(28) |
Aug
(26) |
Sep
(38) |
Oct
(56) |
Nov
(22) |
Dec
(11) |
2019 |
Jan
(37) |
Feb
(8) |
Mar
(7) |
Apr
(29) |
May
(32) |
Jun
(5) |
Jul
(21) |
Aug
(31) |
Sep
(38) |
Oct
(8) |
Nov
(13) |
Dec
(10) |
2020 |
Jan
(9) |
Feb
(33) |
Mar
(14) |
Apr
(4) |
May
(16) |
Jun
(11) |
Jul
(14) |
Aug
(50) |
Sep
(24) |
Oct
(3) |
Nov
(14) |
Dec
(13) |
2021 |
Jan
(18) |
Feb
(15) |
Mar
(12) |
Apr
(9) |
May
(9) |
Jun
(8) |
Jul
(6) |
Aug
(7) |
Sep
(26) |
Oct
(17) |
Nov
(6) |
Dec
(2) |
2022 |
Jan
(3) |
Feb
(11) |
Mar
(7) |
Apr
(15) |
May
(5) |
Jun
(4) |
Jul
(29) |
Aug
(6) |
Sep
(7) |
Oct
|
Nov
(4) |
Dec
(1) |
2023 |
Jan
|
Feb
|
Mar
|
Apr
(10) |
May
(3) |
Jun
(5) |
Jul
(3) |
Aug
(10) |
Sep
(10) |
Oct
(7) |
Nov
(2) |
Dec
(4) |
2024 |
Jan
(22) |
Feb
(5) |
Mar
(11) |
Apr
(20) |
May
(16) |
Jun
(9) |
Jul
(14) |
Aug
(5) |
Sep
(7) |
Oct
(4) |
Nov
(3) |
Dec
|
2025 |
Jan
(6) |
Feb
(6) |
Mar
(14) |
Apr
(2) |
May
|
Jun
(2) |
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
From: Bong C. <nik...@gm...> - 2022-12-21 10:20:46
|
Hi, We've encountered the "SNMPv3 not-in-time window after 248 days" problem and I thought of backporting the fix from 5.2 to the previous version (upgrading seems to be very complicated in our system). But I am having difficulty figuring out what set of changes were made to fix this. Can somebody point me in the right direction on how to get this information? Were there any patches for this available given that we are talking about a very old version. Thanks for your help. Irvin |
From: Bill F. <fe...@gm...> - 2022-11-14 13:50:44
|
I happened to get to talk to Wes about this, and his answer was basically that these things were not meant to be mixed in this way. I have since changed my code to use netsnmp_register_scalar when I want to shadow a scalar, and that works fine. Bill On Wed, Nov 9, 2022 at 8:36 AM Bill Fenner <fe...@gm...> wrote: > Hi, > > I have a MIB module that uses netsnmp_register_scalar() which realloc's > the given root oid to have one more space in it, so that > the netsnmp_scalar_helper_handler can use that space to store the ".0" > instance during the handling of a request. > > This all works fine, until we register an instance for the same object via > netsnmp_register_instance() - or, really, until that instance gets > unregistered, via unregister_mib_context(). At this point, we go back to > calling the scalar handler for that object, but, due to the duplicate > registration, that scalar handler's registration has been duplicated via > netsnmp_subtree_split. Understandably, when netsnmp_subtree_split > duplicates an OID, it doesn't add the magic extra space that the scalar > helper needs, so after this registration and unregistration, the scalar > helper starts stomping on memory it doesn't own. > > Is anyone familiar enough with this code to be able to suggest a way > forward? If the scalar helper wants an extra oid's worth of memory in the > rootoid pointer, it's almost like netsnmp_subtree_split needs to know that > (e.g., a helper can provide its own implementation of snmp_duplicate_objid)? > > Thanks, > Bill > > |
From: Bill F. <fe...@gm...> - 2022-11-09 13:36:58
|
Hi, I have a MIB module that uses netsnmp_register_scalar() which realloc's the given root oid to have one more space in it, so that the netsnmp_scalar_helper_handler can use that space to store the ".0" instance during the handling of a request. This all works fine, until we register an instance for the same object via netsnmp_register_instance() - or, really, until that instance gets unregistered, via unregister_mib_context(). At this point, we go back to calling the scalar handler for that object, but, due to the duplicate registration, that scalar handler's registration has been duplicated via netsnmp_subtree_split. Understandably, when netsnmp_subtree_split duplicates an OID, it doesn't add the magic extra space that the scalar helper needs, so after this registration and unregistration, the scalar helper starts stomping on memory it doesn't own. Is anyone familiar enough with this code to be able to suggest a way forward? If the scalar helper wants an extra oid's worth of memory in the rootoid pointer, it's almost like netsnmp_subtree_split needs to know that (e.g., a helper can provide its own implementation of snmp_duplicate_objid)? Thanks, Bill |
From: Magnus F. <ma...@ly...> - 2022-11-01 12:56:48
|
On Tue, Nov 01, 2022 at 11:17:07AM +0000, Jendal, Bhanu wrote: > Hello Team, > > Can you please help on the below scenario: > Need solution to suppress Warning for 32 bit net-SNMP installing on 64 bit while installing through the command line. The net-snmp project primarily provide source code so that should not be an issue as seen from our point of view. Further, you failed to specify * what platform you are installing on, * where you got the binaries you are trying to install, * what you did, and * what you expected would happen. Could you please tell us that then helping you would be a lot easier. With all this said I would guess you are trying to install some extended net-snmp package you have picked up from some equipment vendor but they based their package on a 32-bit build, probably from RHEL4, and you want to install it on a freshly installed RHEL8 system and now dnf complains? > Regards, > Bhanu Jendal > _______________________________________________ > Net-snmp-coders mailing list > Net...@li... > https://lists.sourceforge.net/lists/listinfo/net-snmp-coders |
From: Jendal, B. <bha...@si...> - 2022-11-01 11:32:15
|
Hello Team, Can you please help on the below scenario: Need solution to suppress Warning for 32 bit net-SNMP installing on 64 bit while installing through the command line. Regards, Bhanu Jendal |
From: Wes H. <har...@us...> - 2022-09-08 20:10:15
|
Simon Chamlian <sim...@mp...> writes: > So once it is compiled in, how do you add the Diffie-Hellman in createUser > instruction in the snmpd.conf file? You still create users per normal, but can change passwords with the snmpusm command. See the snmpusm manual in the "CHANGING PASS PHRASES" section. -- Wes Hardaker Please mail all replies to net...@li... |
From: Simon C. <sim...@mp...> - 2022-09-07 17:18:43
|
So once it is compiled in, how do you add the Diffie-Hellman in createUser instruction in the snmpd.conf file? -Simon On Wed, Sep 7, 2022 at 11:21 AM Wes Hardaker <har...@us...> wrote: > Craig Small via Net-snmp-coders <net...@li...> > writes: > > > My understanding is the only way of adding the key is with the snmpusm > > command. Except it doesn't work for me. > > snmpusm is used to change a key, but isn't really doing DH for each > transaction after that. It's still using a shared-secret. > > (D)TLS support is available, however, for using certificates instead > which is a more modern cryptographic mechanism. > > > $ snmpusm -v3 -u simon -l authPriv -a SHA1 -A simon-pass -x AES128 -X > simon-priv > > localhost changekey simon > > snmpusm: > > Can't get diffie-helman exchange from the agent > > (maybe it doesn't support the SNMP-USM-DH-OBJECTS-MIB MIB) > > That may have meant it wasn't complied in. Make sure the > snmp-usm-dh-objects-mib module is complied into the agent. > > -- > Wes Hardaker > Please mail all replies to net...@li... > |
From: Wes H. <har...@us...> - 2022-09-07 16:43:51
|
Craig Small <csmall@dropbear.xyz> writes: > The 5.9.3 release fixes several security issues. Could someone confirm if it > was only the following two patches that fixed it, or give me a list of the > patches if not? I think those two patches look right, but I'm not sure I'd promise those were the only critical fixes. > Debian has 5.9 in stable and 5.7.3 in old stable I'm going to try to > fix. Is there any reason you can't push stable to 5.9.3? Because that is supposed to be an incremental upgrade such that systems are able to upgrade safely without concern about backward compatibily. -- Wes Hardaker Please mail all replies to net...@li... |
From: Wes H. <har...@us...> - 2022-09-07 15:38:30
|
Craig Small via Net-snmp-coders <net...@li...> writes: > My understanding is the only way of adding the key is with the snmpusm > command. Except it doesn't work for me. snmpusm is used to change a key, but isn't really doing DH for each transaction after that. It's still using a shared-secret. (D)TLS support is available, however, for using certificates instead which is a more modern cryptographic mechanism. > $ snmpusm -v3 -u simon -l authPriv -a SHA1 -A simon-pass -x AES128 -X simon-priv > localhost changekey simon > snmpusm: > Can't get diffie-helman exchange from the agent > (maybe it doesn't support the SNMP-USM-DH-OBJECTS-MIB MIB) That may have meant it wasn't complied in. Make sure the snmp-usm-dh-objects-mib module is complied into the agent. -- Wes Hardaker Please mail all replies to net...@li... |
From: Wes H. <har...@us...> - 2022-09-07 15:38:29
|
Feroz <fer...@gm...> writes: > On net-snmp 5.8, with the following configuration in snmpd.conf file, which > version of SHA (i.e SHA1/SHA-192/SHA-256/SHA-284/SHA-512) is used? > > createUser feroz SHA feroz123 AES feroz123 > rwuser feroz priv If you specify SHA generically, that's an alias for SHA1. Instead, use SHA256 for example to get a stronger token. -- Wes Hardaker Please mail all replies to net...@li... |
From: Wes H. <har...@us...> - 2022-09-07 15:33:24
|
Abhishek Singh <abh...@gm...> writes: > 1. The issue was existing snmpv3 details were not updated in the net-snmp cache. > Used clear_user_list() to clear users details. The patch is in attachments. Is > this the correct way to go forward? If you're always trying to re-create users that patch may work. > 2. SNMP context details are not removed from the net-snmp cache after deleting > context details. > Do we have any API to clear SNMPv3 context details from cache? Unfortunately, there are parts of the agent that don't really handle re-loads of config properly. What contexts are you referring to exactly that isn't getting cleared? Are you referring to a mib module registration on a particular v3 context, or? -- Wes Hardaker Please mail all replies to net...@li... |
From: Craig S. <cs...@dr...> - 2022-09-07 00:16:58
|
Hi Simon, My understanding is the only way of adding the key is with the snmpusm command. Except it doesn't work for me. $ snmpusm -v3 -u simon -l authPriv -a SHA1 -A simon-pass -x AES128 -X simon-priv localhost changekey simon snmpusm: Can't get diffie-helman exchange from the agent (maybe it doesn't support the SNMP-USM-DH-OBJECTS-MIB MIB) I should be getting a set of keys but I'm not. Turning on debugging for usm shows the user being authenticated but no usmDH processing happening. - Craig On Wed, 31 Aug 2022 at 23:46, Simon Chamlian <sim...@mp...> wrote: > > > Hi, > > Does NET-SNMP 5.9.x support Diffie-Hellman? > If so, how do I configure it in snmpd.configuration? > > For example, if I have the following in snmpd.conf: > > createUser simon SHA "simon-pass" AES128 "simon-priv" > rwuser simon > > > How do I add a DH key? > > Thanks, > S. > > > _______________________________________________ > Net-snmp-coders mailing list > Net...@li... > https://lists.sourceforge.net/lists/listinfo/net-snmp-coders > |
From: Simon C. <sim...@mp...> - 2022-08-31 13:45:37
|
Hi, Does NET-SNMP 5.9.x support Diffie-Hellman? If so, how do I configure it in snmpd.configuration? For example, if I have the following in snmpd.conf: createUser simon SHA "simon-pass" AES128 "simon-priv" rwuser simon How do I add a DH key? Thanks, S. |
From: Feroz <fer...@gm...> - 2022-08-13 06:46:33
|
Hi, On net-snmp 5.8, with the following configuration in snmpd.conf file, which version of *SHA *(i.e SHA1/SHA-192/SHA-256/SHA-284/SHA-512) is used? createUser feroz *SHA *feroz123 AES feroz123 rwuser feroz priv -- Regards, Feroz Ahmed |
From: Feroz <fer...@gm...> - 2022-08-09 08:08:13
|
Any inputs on the correct format of IPv6 address that needs to be passed to the following function? Or is there a bug here? *netsnmp_ds_set_string(NETSNMP_DS_LIBRARY_ID,NETSNMP_DS_LIB_CLIENT_ADDR_V6,effective_ipv6);* We tried to pass the following format of IP address to the above function, but nothing seems to work. [IPv6_Address]:161 [IPv6_Address] IPv6_Address On Thu, Jul 28, 2022 at 3:29 PM Vivek Aditya <viv...@gm...> wrote: > Hi > > This query is regarding setting ipv6 source ip for traps. > *Query 1* > > We are using this api > *netsnmp_ds_set_string(NETSNMP_DS_LIBRARY_ID,NETSNMP_DS_LIB_CLIENT_ADDR_V6,effective_ipv6);* > to set the source-ip.Currently we are passing the ipv6 address as 2001::1 > (without enclosing in brackets). But it was *not working* so I made a fix > in this net-snmp function and *post that it works*. + indicates the line > added. Is this a correct fix? any comments would be helpful. > > netsnmp_transport * > netsnmp_udp6_transport(const struct sockaddr_in6 *addr, int local) > { > if (!local) { > const char *client_socket; > client_socket = netsnmp_ds_get_string(NETSNMP_DS_LIBRARY_ID, > > NETSNMP_DS_LIB_CLIENT_ADDR_V6); > if (client_socket) { > struct sockaddr_in6 client_addr; > if(netsnmp_sockaddr_in6_2(&client_addr, client_socket, NULL)) { > + client_addr.sin6_port = 0; > return netsnmp_udp6_transport_with_source(addr, local, > &client_addr); > } > } > } > return netsnmp_udp6_transport_with_source(addr, local, NULL); > } > *Query 2* > > What should be the format to pass the ipv6 address in this api > *netsnmp_ds_set_string(NETSNMP_DS_LIBRARY_ID,NETSNMP_DS_LIB_CLIENT_ADDR_V6,effective_ipv6);*. > for example, should we pass it as 2001::1, or [2001::1] or both are correct > ? > > -- > Warm Regards, > Vivek Aditya > _______________________________________________ > Net-snmp-coders mailing list > Net...@li... > https://lists.sourceforge.net/lists/listinfo/net-snmp-coders > -- Regards, Feroz Ahmed |
From: Hayden R. <ha...@wo...> - 2022-08-05 15:59:54
|
Hi Bart, The changes look great. Go ahead with the merge to master. Hayden On Thu, Aug 4, 2022 at 2:39 PM Bart Van Assche <bva...@ac...> wrote: > On 7/28/22 20:48, Bart Van Assche wrote: > > On 7/27/22 09:27, Hayden Roche wrote: > >> A while back, we (wolfSSL) added support for wolfSSL to net-snmp 5.9.1 > >> for a > >> customer. You can find the patch here: > >> https://github.com/wolfSSL/osp/tree/master/net-snmp > >> > >> Is this something you'd be interested in having upstream? > > > > Support for wolfSSL seems a useful addition to me but I'm not enthusiast > > about the patch the above link points at. I think that patch will need > > significant editing before it's suitable for integration in the Net-SNMP > > code base. > > (replying to my own email) > > A modified version of the patches referred to above is available here: > https://github.com/bvanassche/net-snmp/tree/master-wolf-ssl. If you > agree with these patches I will merge them into the master branch. > > Thanks, > > Bart. > > |
From: Abhishek S. <abh...@gm...> - 2022-08-05 12:40:21
|
Hello, I have a requirement not to restart snmpd for SNMP config changes. Am using the SIGHUP signal to reread for any snmp configuration changes. I was facing two issues while using SIGHUP. 1. The issue was existing snmpv3 details were not updated in the net-snmp cache. Used clear_user_list() to clear users details. The patch is in attachments. Is this the correct way to go forward? 2. SNMP context details are not removed from the net-snmp cache after deleting context details. Do we have any API to clear SNMPv3 context details from cache? Please share API or any other way to solve this problem. Thanks, Abhishek Singh |
From: Bart V. A. <bva...@ac...> - 2022-08-04 21:39:51
|
On 7/28/22 20:48, Bart Van Assche wrote: > On 7/27/22 09:27, Hayden Roche wrote: >> A while back, we (wolfSSL) added support for wolfSSL to net-snmp 5.9.1 >> for a >> customer. You can find the patch here: >> https://github.com/wolfSSL/osp/tree/master/net-snmp >> >> Is this something you'd be interested in having upstream? > > Support for wolfSSL seems a useful addition to me but I'm not enthusiast > about the patch the above link points at. I think that patch will need > significant editing before it's suitable for integration in the Net-SNMP > code base. (replying to my own email) A modified version of the patches referred to above is available here: https://github.com/bvanassche/net-snmp/tree/master-wolf-ssl. If you agree with these patches I will merge them into the master branch. Thanks, Bart. |
From: Bart V. A. <bva...@ac...> - 2022-07-29 03:48:57
|
On 7/27/22 09:27, Hayden Roche wrote: > A while back, we (wolfSSL) added support for wolfSSL to net-snmp 5.9.1 > for a > customer. You can find the patch here: > https://github.com/wolfSSL/osp/tree/master/net-snmp > > Is this something you'd be interested in having upstream? Support for wolfSSL seems a useful addition to me but I'm not enthusiast about the patch the above link points at. I think that patch will need significant editing before it's suitable for integration in the Net-SNMP code base. Thanks, Bart. |
From: Craig S. <cs...@dr...> - 2022-07-28 11:52:11
|
Hi, The 5.9.3 release fixes several security issues. Could someone confirm if it was only the following two patches that fixed it, or give me a list of the patches if not? snmpd: fix bounds checking in NET-SNMP-AGENT-MIB, NET-SNMP-VACM-MIB, SNMP-VIEW-BASED-ACM-MIB, SNMP-USER-BASED-SM-MIB https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937 snmpd: recover SET status from delegated request https://github.com/net-snmp/net-snmp/commit/9a0cd7c00947d5e1c6ceb54558d454f87c3b8341 Debian has 5.9 in stable and 5.7.3 in old stable I'm going to try to fix. - Craig -- Craig Small https://dropbear.xyz/ csmall at : dropbear.xyz Debian GNU/Linux https://www.debian.org/ <http://www.debian.org/> csmall at : debian.org GPG fingerprint: 5D2F B320 B825 D939 04D2 0519 3938 F96B DF50 FEA5 |
From: Vivek A. <viv...@gm...> - 2022-07-28 09:58:50
|
Hi This query is regarding setting ipv6 source ip for traps. *Query 1* We are using this api *netsnmp_ds_set_string(NETSNMP_DS_LIBRARY_ID,NETSNMP_DS_LIB_CLIENT_ADDR_V6,effective_ipv6);* to set the source-ip.Currently we are passing the ipv6 address as 2001::1 (without enclosing in brackets). But it was *not working* so I made a fix in this net-snmp function and *post that it works*. + indicates the line added. Is this a correct fix? any comments would be helpful. netsnmp_transport * netsnmp_udp6_transport(const struct sockaddr_in6 *addr, int local) { if (!local) { const char *client_socket; client_socket = netsnmp_ds_get_string(NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_CLIENT_ADDR_V6); if (client_socket) { struct sockaddr_in6 client_addr; if(netsnmp_sockaddr_in6_2(&client_addr, client_socket, NULL)) { + client_addr.sin6_port = 0; return netsnmp_udp6_transport_with_source(addr, local, &client_addr); } } } return netsnmp_udp6_transport_with_source(addr, local, NULL); } *Query 2* What should be the format to pass the ipv6 address in this api *netsnmp_ds_set_string(NETSNMP_DS_LIBRARY_ID,NETSNMP_DS_LIB_CLIENT_ADDR_V6,effective_ipv6);*. for example, should we pass it as 2001::1, or [2001::1] or both are correct ? -- Warm Regards, Vivek Aditya |
From: Hayden R. <ha...@wo...> - 2022-07-27 16:47:02
|
Hi, A while back, we (wolfSSL) added support for wolfSSL to net-snmp 5.9.1 for a customer. You can find the patch here: https://github.com/wolfSSL/osp/tree/master/net-snmp Is this something you'd be interested in having upstream? Best, Hayden Roche |
From: Craig S. <cs...@dr...> - 2022-07-25 09:26:18
|
On Fri, 22 Jul 2022 at 17:54, Magnus Fromreide <ma...@ly...> wrote: > 06_extramibs.patch - which adds the Gnome MIB - touches on something I have > pondering - how should a distribution add MIBs? > > On Debian we have this patch. > > On RedHat Net-SNMP ships one heap of MIBs and libsmi ships another, > slightly > different, heap of MIBs - when one wish to depend on MIBs present in one > but > not the other set things becomes interesting. > Debian has snmp-mibs-downloader which gets around the MIBs licensing issue. Most of the ones that come with net-snmp we have to strip out. The single MIB added in the Debian package is the Gnome one with the corrected enterprises OID. I think some of the dependent MIBs use the wrong one. I do not know where one should even discuss this issue as it touches on > integration of multiple projects in multiple distributions. > Nor do I, for procps we use the upstream list. - Craig |
From: Magnus F. <ma...@ly...> - 2022-07-22 07:54:11
|
On Thu, Jul 21, 2022 at 08:37:29PM +1000, Craig Small wrote: > Hi, > I'd like to see how I can reduce the number of patches carried by the > Debian net-snmp packages. Some of these will have to stay because we have a > particular way of storing files for example. That will also mean these > fixes will be everywhere and not just in Debian. > > If you want to see them all, they're located at [1]. Some of them are > simple fixes for typos or making groff happy, others are updating the > lm-sensors API and many other things. > > My question is, what is the best way to send them? Porting says "use CVS > diff -u" so I'm assuming then patches are ok (they're the easiest for me). > I wasn't planning on sending all 43 and grouping some similar ones up, > starting with the simplest/least controversial ones. > > - Craig > > > 1: https://salsa.debian.org/debian/net-snmp/-/tree/master/debian/patches 06_extramibs.patch - which adds the Gnome MIB - touches on something I have pondering - how should a distribution add MIBs? On Debian we have this patch. On RedHat Net-SNMP ships one heap of MIBs and libsmi ships another, slightly different, heap of MIBs - when one wish to depend on MIBs present in one but not the other set things becomes interesting. I do not know where one should even discuss this issue as it touches on integration of multiple projects in multiple distributions. |
From: Craig S. <cs...@dr...> - 2022-07-21 10:43:46
|
Hi, I'd like to see how I can reduce the number of patches carried by the Debian net-snmp packages. Some of these will have to stay because we have a particular way of storing files for example. That will also mean these fixes will be everywhere and not just in Debian. If you want to see them all, they're located at [1]. Some of them are simple fixes for typos or making groff happy, others are updating the lm-sensors API and many other things. My question is, what is the best way to send them? Porting says "use CVS diff -u" so I'm assuming then patches are ok (they're the easiest for me). I wasn't planning on sending all 43 and grouping some similar ones up, starting with the simplest/least controversial ones. - Craig 1: https://salsa.debian.org/debian/net-snmp/-/tree/master/debian/patches -- Craig Small https://dropbear.xyz/ csmall at : dropbear.xyz Debian GNU/Linux https://www.debian.org/ <http://www.debian.org/> csmall at : debian.org GPG fingerprint: 5D2F B320 B825 D939 04D2 0519 3938 F96B DF50 FEA5 |