Martin> There are indeed some issues with the enginetime (at least in
Martin> 5.0.8 and probably still in 5.1.x). [...]
Martin> Looking at the code there also seemed
Martin> to be an overflow problem occuring after 248 days and some tests
Martin> seemed to verify this. Both large time changes and the 248 days
Martin> overflow causes the agent to get stuck in "notInTimeWindow"-mode.

Thanks for the pointer. The former discussion ended up in
http://sf.net/mailarchive/forum.php?thread_id=4464869&forum_id=7152
with no indication of what branches this patch has been applied to.

Looking at 5.1.2.pre2's snmplib/snmpv3.c I still see the old code,
implying that any SNMPv3 agent based on a released Net-SNMP version
will stop working after ~248 days (for SNMPv3)!!? Am I missing something?

As this would qualify as a (serious) bug to me, can the patch be applied
to all branches, ASAP, please?

Thomas> 2. The 5.1.2.pre2 command-line tools (e.g. snmpget) handle this situation
Thomas> quite badly: after sending the request seven times (and getting the REPORT
Thomas> response each time), they hang in select() forever :(

Here's the last output from "snmpget -Dall ..." before the client gets
stuck in select():

dumpv_recv:                ObjID: SNMP-USER-BASED-SM-MIB::usmStatsNotInTimeWindows.0
trace: snmp_pdu_parse(): snmp_api.c, 4257:
dumph_recv:             Value
dumpx_recv:              41 02 04 77
dumpv_recv:                UInteger:    1143 (0x477)
trace: _snmp_parse(): snmp_api.c, 3983:
snmp_parse: Parsed SNMPv3 message (secName:xxxxxx, secLevel:authNoPriv):
trace: snmpv3_get_report_type(): snmp_api.c, 3879:
report: Report type: -36
trace: snmp_sess_select_info(): snmp_api.c, 5621:
sess_select: for all sessions: 3



+Thomas

--
Thomas Anders (thomas.anders at blue-cable.de)


-------------------------------------------------------
This SF.Net email sponsored by Black Hat Briefings & Training.
Attend Black Hat Briefings & Training, Las Vegas July 24-29 - digital self defense, top technical experts, no vendor pitches, unmatched networking opportunities. Visit www.blackhat.com
_______________________________________________
Net-snmp-coders mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/net-snmp-coders

Reply via email to